{"id":42753531,"url":"https://github.com/bad-antics/nullkia","last_synced_at":"2026-01-31T04:08:31.011Z","repository":{"id":333945284,"uuid":"1139350972","full_name":"bad-antics/nullkia","owner":"bad-antics","description":"NullKia Mobile Security Framework - Tools in Nim, Crystal, V, D, Red, Odin, Haxe, Zig, Kotlin, Lua, PHP, Python | bad-antics | discord.gg/killers","archived":false,"fork":false,"pushed_at":"2026-01-29T02:00:14.000Z","size":168,"stargazers_count":3,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-01-29T13:13:37.810Z","etag":null,"topics":["android","android-hacking","baseband","bootloader-unlock","checkm8","crystal","firmware-hacking","haxe","infosec","ios-jailbreak","mobile-security","nim","nullkia","nullsec","odin-lang","penetration-testing","samsung-knox","security-framework","unusual-languages","vlang"],"latest_commit_sha":null,"homepage":null,"language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/bad-antics.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2026-01-21T21:08:08.000Z","updated_at":"2026-01-29T02:00:17.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/bad-antics/nullkia","commit_stats":null,"previous_names":["bad-antics/nullkia"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/bad-antics/nullkia","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bad-antics%2Fnullkia","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bad-antics%2Fnullkia/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bad-antics%2Fnullkia/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bad-antics%2Fnullkia/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/bad-antics","download_url":"https://codeload.github.com/bad-antics/nullkia/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bad-antics%2Fnullkia/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28928895,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-31T04:05:25.756Z","status":"ssl_error","status_checked_at":"2026-01-31T04:02:35.005Z","response_time":128,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","android-hacking","baseband","bootloader-unlock","checkm8","crystal","firmware-hacking","haxe","infosec","ios-jailbreak","mobile-security","nim","nullkia","nullsec","odin-lang","penetration-testing","samsung-knox","security-framework","unusual-languages","vlang"],"created_at":"2026-01-29T20:00:46.267Z","updated_at":"2026-01-31T04:08:31.004Z","avatar_url":"https://github.com/bad-antics.png","language":"Go","readme":"\u003c!-- \nSEO Keywords: NullKia, mobile security, phone hacking, Android exploitation, iOS jailbreak,\nSamsung Knox bypass, bootloader unlock, firmware hacking, baseband exploitation,\ncheckm8, checkra1n, iPhone exploit, Pixel rooting, Titan M, OnePlus unbrick,\nXiaomi Mi Unlock, Huawei HiSuite, EDL mode, ODIN, MSM download, fastboot,\nmobile pentesting, cellular security, phone forensics, SIM unlock, IMEI repair,\nbad-antics, NullSec Framework, mobile red team, phone security research,\nNothing Phone, OPPO, Vivo, Realme, ASUS ROG, ZTE, Fairphone, TCL\n--\u003e\n\n\u003cdiv align=\"center\"\u003e\n\n# 📱 NullKia\n\n### Mobile Security Framework v3.0.0\n\n[![Discord](https://img.shields.io/badge/🔑_GET_KEYS-discord.gg/killers-5865F2?style=for-the-badge\u0026logo=discord\u0026logoColor=white)](https://discord.gg/killers)\n[![GitHub](https://img.shields.io/badge/GitHub-bad--antics-181717?style=for-the-badge\u0026logo=github\u0026logoColor=white)](https://github.com/bad-antics)\n[![License](https://img.shields.io/badge/License-MIT-green?style=for-the-badge)](LICENSE)\n[![Devices](https://img.shields.io/badge/Devices-500+-orange?style=for-the-badge)]()\n[![Manufacturers](https://img.shields.io/badge/Manufacturers-18-blue?style=for-the-badge)]()\n\n```\n ███╗   ██╗██╗   ██╗██╗     ██╗     ██╗  ██╗██╗ █████╗ \n ████╗  ██║██║   ██║██║     ██║     ██║ ██╔╝██║██╔══██╗\n ██╔██╗ ██║██║   ██║██║     ██║     █████╔╝ ██║███████║\n ██║╚██╗██║██║   ██║██║     ██║     ██╔═██╗ ██║██╔══██║\n ██║ ╚████║╚██████╔╝███████╗███████╗██║  ██╗██║██║  ██║\n ╚═╝  ╚═══╝ ╚═════╝ ╚══════╝╚══════╝╚═╝  ╚═╝╚═╝╚═╝  ╚═╝\n      [ MOBILE SECURITY FRAMEWORK v3.0 | bad-antics ]\n```\n\n### 🔓 **[Join discord.gg/killers](https://discord.gg/killers)** for encryption keys \u0026 firmware unlocks!\n\n\u003c/div\u003e\n\n---\n\n## 🆕 What's New in v3.0\n\n- **8 New Manufacturers** — Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL\n- **Baseband Exploitation** — Shannon/Exynos/Qualcomm modem tools\n- **eSIM Tools** — eUICC provisioning and extraction\n- **5G/LTE Security** — Band locking, IMSI analysis, carrier unlock\n- **iOS 17/18 Support** — Updated checkm8 toolchain\n- **Android 14/15 Support** — New bypass techniques\n- **GUI Mode** — Optional graphical interface\n- **Plugin System** — Extend with custom modules\n\n---\n\n## ⚡ Quick Install\n\n### Linux / macOS\n```bash\ncurl -sL https://raw.githubusercontent.com/bad-antics/nullkia/main/get-nullkia.sh | bash\n```\n\n### Windows (PowerShell as Admin)\n```powershell\niwr -useb https://raw.githubusercontent.com/bad-antics/nullkia/main/install.ps1 | iex\n```\n\n### Android (Termux)\n```bash\npkg install git \u0026\u0026 git clone https://github.com/bad-antics/nullkia \u0026\u0026 cd nullkia \u0026\u0026 make termux\n```\n\n### Docker\n```bash\ndocker run -it --privileged -v /dev/bus/usb:/dev/bus/usb ghcr.io/bad-antics/nullkia:3.0\n```\n\n### GUI Mode\n```bash\nnullkia --gui    # Launches graphical interface\n```\n\n📖 **[Full Installation Guide](INSTALL.md)**\n\n---\n\n## 🎯 Features\n\n| Feature | Description |\n|---------|-------------|\n| 📱 **18 Manufacturers** | Samsung, Apple, Google, OnePlus, Xiaomi, Huawei, Motorola, LG, Sony, Nokia, Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL |\n| ⚡ **Device Detection** | Auto-detect ADB, Fastboot, EDL, DFU, Download, BROM modes |\n| 🔓 **Bootloader Tools** | Unlock bootloaders across all manufacturers |\n| 📦 **Firmware Utils** | Dump, extract, flash, decrypt, and analyze firmware |\n| 🛡️ **Security Bypass** | Knox, Titan M, TrustZone, TEE research tools |\n| 📡 **Baseband Tools** | Modem exploitation, IMSI extraction, band manipulation |\n| 📶 **Cellular Security** | 5G/LTE analysis, carrier unlock, eSIM tools |\n| 🔧 **Unbrick Tools** | Recover hard-bricked devices |\n| 🖥️ **Cross-Platform** | Linux, macOS, Windows, Termux, Docker |\n| 🎨 **GUI Mode** | Optional graphical interface |\n| 🔌 **Plugin System** | Extend with custom modules |\n\n---\n\n## 🚀 Usage\n\n```bash\n# Show help\nnullkia help\n\n# Launch GUI mode\nnullkia --gui\n\n# Scan for connected devices\nnullkia device scan\nnullkia device info          # Detailed device information\n\n# Samsung tools\nnullkia samsung knox-bypass\nnullkia samsung odin\nnullkia samsung frp-bypass\nnullkia samsung dump-efs     # NEW: Dump EFS partition\n\n# Apple tools (checkm8 devices)\nnullkia apple checkm8\nnullkia apple dfu\nnullkia apple activation     # NEW: Activation bypass\nnullkia apple icloud         # NEW: iCloud tools\n\n# Google Pixel\nnullkia google titan-dump    # NEW: Titan M research\nnullkia google avb-bypass    # NEW: AVB bypass\n\n# Baseband/Modem (NEW)\nnullkia baseband dump        # Dump modem firmware\nnullkia baseband shannon     # Samsung Shannon exploits\nnullkia baseband qualcomm    # Qualcomm modem tools\nnullkia baseband analyze     # Analyze baseband binary\n\n# Cellular/Network (NEW)\nnullkia cellular unlock      # Carrier unlock\nnullkia cellular bands       # Band manipulation\nnullkia cellular esim        # eSIM extraction/provisioning\nnullkia cellular imsi        # IMSI/IMEI analysis\n\n# Firmware operations\nnullkia firmware dump\nnullkia firmware flash\nnullkia firmware decrypt     # NEW: Decrypt firmware\nnullkia firmware analyze\nnullkia firmware diff        # NEW: Compare firmware versions\n\n# Security research\nnullkia trustzone dump       # NEW: TEE extraction\nnullkia bootrom dump         # NEW: BootROM extraction\nnullkia secure-element       # NEW: SE research\n\n# Plugin system (NEW)\nnullkia plugin list\nnullkia plugin install \u003cname\u003e\nnullkia plugin create \u003cname\u003e\n\n# Reboot device\nnullkia device reboot fastboot\nnullkia device reboot recovery\nnullkia device reboot edl\nnullkia device reboot brom   # NEW: MediaTek BROM mode\n```\n\n---\n\n## 📱 Supported Manufacturers (18)\n\n### Tier 1 — Full Support\n\n| Manufacturer | Devices | Features |\n|--------------|---------|----------|\n| **Samsung** | Galaxy S/Note/A/M/Z series | Knox bypass, ODIN, FRP, EFS dump, Shannon baseband |\n| **Apple** | iPhone 4s → iPhone X (A5-A11) | checkm8, DFU, activation bypass, iCloud tools |\n| **Google** | Pixel 1-9, Tensor | Titan M research, fastboot unlock, AVB bypass |\n| **OnePlus** | All models | MSM unbrick, OxygenOS tools, Engineering mode |\n| **Xiaomi** | Mi/Redmi/POCO/Black Shark | Mi Unlock bypass, EDL, MIUI flash, Secure boot |\n\n### Tier 2 — Extended Support\n\n| Manufacturer | Devices | Features |\n|--------------|---------|----------|\n| **Huawei** | P/Mate/Nova (pre-2020) | HiSuite, bootloader unlock, Kirin tools |\n| **OPPO** | Find/Reno/A series | ColorOS tools, MSM mode, test points |\n| **Vivo** | X/V/Y series | Funtouch tools, fastboot, EDL mode |\n| **Realme** | GT/Number series | Realme UI tools, deep testing |\n| **Motorola** | Edge/G/Razr | Fastboot unlock, RSD Lite |\n| **Nothing** | Phone (1)/(2)/(2a) | Fastboot unlock, Nothing OS tools |\n| **ASUS** | ROG Phone/ZenFone | APX mode, unlock tools |\n\n### Tier 3 — Basic Support\n\n| Manufacturer | Devices | Features |\n|--------------|---------|----------|\n| **Sony** | Xperia series | Fastboot unlock, Emma tools |\n| **LG** | Legacy devices | LAF mode, LGUP |\n| **Nokia** | Android devices | Fastboot, OST tools |\n| **ZTE** | Blade/Axon | MiFavor tools, EDL |\n| **Fairphone** | FP3/FP4/FP5 | Fastboot unlock (official) |\n| **TCL** | 10/20/30 series | TCL tools, EDL mode |\n\n---\n\n## 📡 Baseband Security (NEW in v3.0)\n\n### Supported Modems\n\n| Vendor | Chipsets | Capabilities |\n|--------|----------|--------------|\n| **Qualcomm** | SDX55, SDX65, X65, X70 | Firmware dump, diag mode, band lock |\n| **Samsung Shannon** | Shannon 5100, 5123, 5300 | EFS dump, IMEI repair, NV extraction |\n| **MediaTek** | Dimensity series | BROM exploit, modem dump |\n| **Intel/Apple** | XMM 7560, 8160 | Legacy iPhone baseband |\n| **Exynos Modem** | Exynos 5G | Research tools |\n\n### Baseband Operations\n\n```bash\n# Dump modem firmware\nnullkia baseband dump --output modem.bin\n\n# Samsung Shannon specific\nnullkia baseband shannon --extract-nv\nnullkia baseband shannon --patch-imei\n\n# Qualcomm diag mode\nnullkia baseband qualcomm --diag-enable\nnullkia baseband qualcomm --read-efs\n\n# Band manipulation\nnullkia cellular bands --lock \"1,3,7,20,28\"\nnullkia cellular bands --unlock-all\n\n# eSIM operations\nnullkia cellular esim --dump-euicc\nnullkia cellular esim --list-profiles\n```\n\n---\n\n## 🔐 Security Research Tools (NEW)\n\n### TEE/TrustZone\n```bash\n# Dump TrustZone components\nnullkia trustzone dump --output tz_dump/\n\n# Extract secure world binaries\nnullkia trustzone extract-ta    # Trusted Applications\n\n# Analyze TEE\nnullkia trustzone analyze\n```\n\n### BootROM\n```bash\n# Dump BootROM (where supported)\nnullkia bootrom dump --chipset exynos9825\n\n# Exploit known vulnerabilities\nnullkia bootrom exploit --checkm8    # Apple\nnullkia bootrom exploit --mtk-brom   # MediaTek\n```\n\n### Secure Element\n```bash\n# SE research (Titan M, Knox, etc.)\nnullkia secure-element info\nnullkia secure-element dump-attestation\n```\n\n---\n\n## 📂 Project Structure\n\n```\nnullkia/\n├── install.sh          # Linux/macOS installer\n├── install.ps1         # Windows installer\n├── get-nullkia.sh      # One-line curl installer\n├── Dockerfile          # Docker support\n├── Makefile            # Build system\n├── INSTALL.md          # Installation guide\n│\n├── samsung/            # Samsung/Knox tools\n├── apple/              # iOS/checkm8 tools\n├── google/             # Pixel/Titan M tools\n├── oneplus/            # OnePlus tools\n├── xiaomi/             # Xiaomi/MIUI tools\n├── huawei/             # Huawei/EMUI tools\n├── oppo/               # OPPO/ColorOS tools (NEW)\n├── vivo/               # Vivo/Funtouch tools (NEW)\n├── realme/             # Realme tools (NEW)\n├── motorola/           # Motorola tools\n├── nothing/            # Nothing Phone tools (NEW)\n├── asus/               # ASUS ROG tools (NEW)\n├── lg/                 # LG tools\n├── sony/               # Sony tools\n├── nokia/              # Nokia tools\n├── zte/                # ZTE tools (NEW)\n├── fairphone/          # Fairphone tools (NEW)\n├── tcl/                # TCL tools (NEW)\n│\n├── baseband/           # Modem/baseband tools (NEW)\n├── cellular/           # 5G/LTE tools (NEW)\n├── trustzone/          # TEE research tools (NEW)\n├── bootrom/            # BootROM tools (NEW)\n├── secure-element/     # SE research (NEW)\n│\n├── firmware/           # Firmware utilities\n├── installer/          # Platform installers\n├── plugins/            # Plugin system (NEW)\n├── gui/                # GUI components (NEW)\n└── tools/              # Common utilities\n```\n\n---\n\n## 🔌 Plugin System (NEW)\n\nExtend NullKia with custom modules:\n\n```bash\n# List available plugins\nnullkia plugin list\n\n# Install community plugin\nnullkia plugin install samsung-advanced\nnullkia plugin install mtk-bypass\n\n# Create your own plugin\nnullkia plugin create my-plugin\n```\n\n### Plugin Structure\n```\nplugins/my-plugin/\n├── manifest.json       # Plugin metadata\n├── main.py             # Entry point\n├── commands/           # CLI commands\n└── lib/                # Supporting code\n```\n\n---\n\n## 🖥️ GUI Mode (NEW)\n\nLaunch the graphical interface:\n\n```bash\nnullkia --gui\n```\n\nFeatures:\n- Device detection dashboard\n- One-click operations\n- Firmware browser\n- Log viewer\n- Theme support (dark/light)\n\n---\n\n## 🔐 Encryption Keys\n\nSome features require encryption keys available exclusively on our Discord:\n\n🔑 **[discord.gg/killers](https://discord.gg/killers)**\n\n- Knox bypass keys\n- Firmware decryption keys\n- EDL firehose loaders\n- Bootloader unlock tokens\n- Baseband research tools\n- eSIM provisioning keys\n\n---\n\n## 🛠️ Requirements\n\n| Platform | Requirements |\n|----------|-------------|\n| Linux | `adb`, `fastboot`, `libusb`, `python3` |\n| macOS | Homebrew, `android-platform-tools` |\n| Windows | USB drivers, PowerShell 5+ |\n| Termux | `android-tools` package |\n| Docker | Docker Desktop with USB passthrough |\n| GUI | GTK3 or Qt5 |\n\n---\n\n## 📋 Changelog\n\n### v3.0.0 (January 2026)\n- Added 8 new manufacturers (Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL)\n- Baseband exploitation tools (Shannon, Qualcomm, MediaTek)\n- eSIM/eUICC tools\n- 5G/LTE security analysis\n- TrustZone/TEE research tools\n- BootROM extraction (where supported)\n- Secure Element research\n- GUI mode\n- Plugin system\n- iOS 17/18 support\n- Android 14/15 support\n\n### v2.0.0 (2025)\n- Multi-manufacturer support\n- Docker support\n- Cross-platform installers\n\n### v1.0.0 (2024)\n- Initial release\n- Samsung, Apple, Google support\n\n---\n\n## ⚠️ Disclaimer\n\nThis tool is for **security research and educational purposes only**. Use responsibly and only on devices you own or have explicit permission to test. The authors are not responsible for any misuse or damage.\n\n---\n\n## 📜 License\n\nMIT License - [@bad-antics](https://github.com/bad-antics)\n\n---\n\n\u003cdiv align=\"center\"\u003e\n\n**[⭐ Star this repo](https://github.com/bad-antics/nullkia)** | **[🔑 Get Keys](https://discord.gg/killers)** | **[🐛 Report Bug](https://github.com/bad-antics/nullkia/issues)** | **[📱 Device Request](https://github.com/bad-antics/nullkia/issues/new)**\n\n[![GitHub](https://img.shields.io/badge/GitHub-bad--antics-181717?style=for-the-badge\u0026logo=github\u0026logoColor=white)](https://github.com/bad-antics)\n[![Discord](https://img.shields.io/badge/Discord-killers-5865F2?style=for-the-badge\u0026logo=discord\u0026logoColor=white)](https://discord.gg/killers)\n\n**Part of the [NullSec Linux](https://github.com/bad-antics/nullsec-linux) ecosystem**\n\n\u003c/div\u003e\n\n## 📱 Supported Devices\n\n### Samsung Galaxy\n- S24 Ultra, S24+, S24\n- S23 Ultra, S23+, S23\n- Z Fold 5, Z Flip 5\n- A54 5G, A34 5G\n\n### Apple iPhone\n- iPhone 15 Pro Max, 15 Pro, 15\n- iPhone 14 Pro Max, 14 Pro, 14\n- iPhone SE (3rd gen)\n\n### Google Pixel\n- Pixel 8 Pro, Pixel 8\n- Pixel 7 Pro, Pixel 7, Pixel 7a\n- Pixel 6 Pro, Pixel 6\n\n## 🔬 Baseband Research\n\n| Modem | Manufacturer | Tools |\n|-------|--------------|-------|\n| Shannon | Samsung | shannon-dump, modem-decode |\n| Snapdragon X75 | Qualcomm | qc-diag, mdm-flash |\n| Dimensity 9300 | MediaTek | mtk-exploit, brom-tools |\n| Apple M3 | Apple | iboot-extract, sep-dump |\n\n\n\u003c!-- Updated: 2026-01-25 13:02:45 --\u003e\n\n\u003c!-- Updated: 2026-01-25 13:42:28 --\u003e\n\n\u003c!-- Updated: 2026-01-25 13:42:29 --\u003e\n\n\u003c!-- Updated: 2026-01-25 13:52:22 --\u003e\n\n\u003c!-- Updated: 2026-01-25 18:00:09 --\u003e\n\n\u003c!-- Updated: 2026-01-27 14:00:03 --\u003e\n\n\u003c!-- Updated: 2026-01-28 14:00:01 --\u003e\n\n\u003c!-- Updated: 2026-01-28 18:00:12 --\u003e\n\n\u003c!-- Updated: 2026-01-28 18:00:13 --\u003e\n","funding_links":[],"categories":["Tools"],"sub_categories":["Misc Tools","Diameter"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbad-antics%2Fnullkia","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fbad-antics%2Fnullkia","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbad-antics%2Fnullkia/lists"}