Quantcast
Channel: xda-developers - Android Software and Hacking General [Developers Only]
Viewing all articles
Browse latest Browse all 3614

CobaltDebugger

$
0
0
Very early beta, use at your own risk.

https://youtu.be/L5NDob2rCmI

Run CobaltDebugger.exe
(ArmRunner.exe was the initial Console App Project but it evolved to a GUI project that references ArmRunner via reference like a dll)
Load up your aboot.mbn or sbl1.mbn
Memory file will grow to about 4GB probably
Click "Read Header"
Then click "Step" or "Run"
Set breakpoints
Alter register values, condition flags, or psr modes to test alternate paths
Memory edits are not yet implemented but coming soon as time permits
Page Up, Page Down, Up, and Down keys can be used to view memory - or you can type an address and click "Go" to go there
To get the strings file, load up your binary in IDA Pro, generate the strings view, copy and paste the entire window contents to a new text file, CobaltDebugger should read that just fine. What that does is tell you which string was referenced whenever a memory address is accessed that corresponds to a string in that file.

All ARM instruction were implemented in C# by hand by me. There could be bugs. Not all instructions have been implemented so you may encounter an exception that states such and such instruction not implemented. If you see that, let me know which instruction and I will implement it as time permits.
Built with the binaries from the AT&T Samsung Galaxy Note 3 in mind and runs the NC2 binaries pretty much fully.
Should work with other similar binaries like the ones from the Verizon Galaxy S4, although I have already seen a few instructions missing I still need to implement.

I'm hoping this will help us discover new ways to unlock bootloaders. But at the very least it's fun to watch the files run.

Attached Files
File Type: zip CobaltDebugger.zip - [Click for QR Code] (1.06 MB)

Viewing all articles
Browse latest Browse all 3614

Trending Articles