Skip to content

NullKia Mobile Security Framework - Tools in Nim, Crystal, V, D, Red, Odin, Haxe, Zig, Kotlin, Lua, PHP, Python | bad-antics | discord.gg/killers

Notifications You must be signed in to change notification settings

bad-antics/nullkia

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ“± NullKia

Mobile Security Framework v3.0.0

Discord GitHub License Devices Manufacturers

 β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—     β–ˆβ–ˆβ•—     β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— 
 β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—
 β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘
 β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘
 β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘
 β•šβ•β•  β•šβ•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β•β•β•β•β•β•β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•šβ•β•  β•šβ•β•
      [ MOBILE SECURITY FRAMEWORK v3.0 | bad-antics ]

πŸ”“ Join discord.gg/killers for encryption keys & firmware unlocks!


πŸ†• What's New in v3.0

  • 8 New Manufacturers β€” Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL
  • Baseband Exploitation β€” Shannon/Exynos/Qualcomm modem tools
  • eSIM Tools β€” eUICC provisioning and extraction
  • 5G/LTE Security β€” Band locking, IMSI analysis, carrier unlock
  • iOS 17/18 Support β€” Updated checkm8 toolchain
  • Android 14/15 Support β€” New bypass techniques
  • GUI Mode β€” Optional graphical interface
  • Plugin System β€” Extend with custom modules

⚑ Quick Install

Linux / macOS

curl -sL https://raw.githubusercontent.com/bad-antics/nullkia/main/get-nullkia.sh | bash

Windows (PowerShell as Admin)

iwr -useb https://raw.githubusercontent.com/bad-antics/nullkia/main/install.ps1 | iex

Android (Termux)

pkg install git && git clone https://github.com/bad-antics/nullkia && cd nullkia && make termux

Docker

docker run -it --privileged -v /dev/bus/usb:/dev/bus/usb ghcr.io/bad-antics/nullkia:3.0

GUI Mode

nullkia --gui    # Launches graphical interface

πŸ“– Full Installation Guide


🎯 Features

Feature Description
πŸ“± 18 Manufacturers Samsung, Apple, Google, OnePlus, Xiaomi, Huawei, Motorola, LG, Sony, Nokia, Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL
⚑ Device Detection Auto-detect ADB, Fastboot, EDL, DFU, Download, BROM modes
πŸ”“ Bootloader Tools Unlock bootloaders across all manufacturers
πŸ“¦ Firmware Utils Dump, extract, flash, decrypt, and analyze firmware
πŸ›‘οΈ Security Bypass Knox, Titan M, TrustZone, TEE research tools
πŸ“‘ Baseband Tools Modem exploitation, IMSI extraction, band manipulation
πŸ“Ά Cellular Security 5G/LTE analysis, carrier unlock, eSIM tools
πŸ”§ Unbrick Tools Recover hard-bricked devices
πŸ–₯️ Cross-Platform Linux, macOS, Windows, Termux, Docker
🎨 GUI Mode Optional graphical interface
πŸ”Œ Plugin System Extend with custom modules

πŸš€ Usage

# Show help
nullkia help

# Launch GUI mode
nullkia --gui

# Scan for connected devices
nullkia device scan
nullkia device info          # Detailed device information

# Samsung tools
nullkia samsung knox-bypass
nullkia samsung odin
nullkia samsung frp-bypass
nullkia samsung dump-efs     # NEW: Dump EFS partition

# Apple tools (checkm8 devices)
nullkia apple checkm8
nullkia apple dfu
nullkia apple activation     # NEW: Activation bypass
nullkia apple icloud         # NEW: iCloud tools

# Google Pixel
nullkia google titan-dump    # NEW: Titan M research
nullkia google avb-bypass    # NEW: AVB bypass

# Baseband/Modem (NEW)
nullkia baseband dump        # Dump modem firmware
nullkia baseband shannon     # Samsung Shannon exploits
nullkia baseband qualcomm    # Qualcomm modem tools
nullkia baseband analyze     # Analyze baseband binary

# Cellular/Network (NEW)
nullkia cellular unlock      # Carrier unlock
nullkia cellular bands       # Band manipulation
nullkia cellular esim        # eSIM extraction/provisioning
nullkia cellular imsi        # IMSI/IMEI analysis

# Firmware operations
nullkia firmware dump
nullkia firmware flash
nullkia firmware decrypt     # NEW: Decrypt firmware
nullkia firmware analyze
nullkia firmware diff        # NEW: Compare firmware versions

# Security research
nullkia trustzone dump       # NEW: TEE extraction
nullkia bootrom dump         # NEW: BootROM extraction
nullkia secure-element       # NEW: SE research

# Plugin system (NEW)
nullkia plugin list
nullkia plugin install <name>
nullkia plugin create <name>

# Reboot device
nullkia device reboot fastboot
nullkia device reboot recovery
nullkia device reboot edl
nullkia device reboot brom   # NEW: MediaTek BROM mode

πŸ“± Supported Manufacturers (18)

Tier 1 β€” Full Support

Manufacturer Devices Features
Samsung Galaxy S/Note/A/M/Z series Knox bypass, ODIN, FRP, EFS dump, Shannon baseband
Apple iPhone 4s β†’ iPhone X (A5-A11) checkm8, DFU, activation bypass, iCloud tools
Google Pixel 1-9, Tensor Titan M research, fastboot unlock, AVB bypass
OnePlus All models MSM unbrick, OxygenOS tools, Engineering mode
Xiaomi Mi/Redmi/POCO/Black Shark Mi Unlock bypass, EDL, MIUI flash, Secure boot

Tier 2 β€” Extended Support

Manufacturer Devices Features
Huawei P/Mate/Nova (pre-2020) HiSuite, bootloader unlock, Kirin tools
OPPO Find/Reno/A series ColorOS tools, MSM mode, test points
Vivo X/V/Y series Funtouch tools, fastboot, EDL mode
Realme GT/Number series Realme UI tools, deep testing
Motorola Edge/G/Razr Fastboot unlock, RSD Lite
Nothing Phone (1)/(2)/(2a) Fastboot unlock, Nothing OS tools
ASUS ROG Phone/ZenFone APX mode, unlock tools

Tier 3 β€” Basic Support

Manufacturer Devices Features
Sony Xperia series Fastboot unlock, Emma tools
LG Legacy devices LAF mode, LGUP
Nokia Android devices Fastboot, OST tools
ZTE Blade/Axon MiFavor tools, EDL
Fairphone FP3/FP4/FP5 Fastboot unlock (official)
TCL 10/20/30 series TCL tools, EDL mode

πŸ“‘ Baseband Security (NEW in v3.0)

Supported Modems

Vendor Chipsets Capabilities
Qualcomm SDX55, SDX65, X65, X70 Firmware dump, diag mode, band lock
Samsung Shannon Shannon 5100, 5123, 5300 EFS dump, IMEI repair, NV extraction
MediaTek Dimensity series BROM exploit, modem dump
Intel/Apple XMM 7560, 8160 Legacy iPhone baseband
Exynos Modem Exynos 5G Research tools

Baseband Operations

# Dump modem firmware
nullkia baseband dump --output modem.bin

# Samsung Shannon specific
nullkia baseband shannon --extract-nv
nullkia baseband shannon --patch-imei

# Qualcomm diag mode
nullkia baseband qualcomm --diag-enable
nullkia baseband qualcomm --read-efs

# Band manipulation
nullkia cellular bands --lock "1,3,7,20,28"
nullkia cellular bands --unlock-all

# eSIM operations
nullkia cellular esim --dump-euicc
nullkia cellular esim --list-profiles

πŸ” Security Research Tools (NEW)

TEE/TrustZone

# Dump TrustZone components
nullkia trustzone dump --output tz_dump/

# Extract secure world binaries
nullkia trustzone extract-ta    # Trusted Applications

# Analyze TEE
nullkia trustzone analyze

BootROM

# Dump BootROM (where supported)
nullkia bootrom dump --chipset exynos9825

# Exploit known vulnerabilities
nullkia bootrom exploit --checkm8    # Apple
nullkia bootrom exploit --mtk-brom   # MediaTek

Secure Element

# SE research (Titan M, Knox, etc.)
nullkia secure-element info
nullkia secure-element dump-attestation

πŸ“‚ Project Structure

nullkia/
β”œβ”€β”€ install.sh          # Linux/macOS installer
β”œβ”€β”€ install.ps1         # Windows installer
β”œβ”€β”€ get-nullkia.sh      # One-line curl installer
β”œβ”€β”€ Dockerfile          # Docker support
β”œβ”€β”€ Makefile            # Build system
β”œβ”€β”€ INSTALL.md          # Installation guide
β”‚
β”œβ”€β”€ samsung/            # Samsung/Knox tools
β”œβ”€β”€ apple/              # iOS/checkm8 tools
β”œβ”€β”€ google/             # Pixel/Titan M tools
β”œβ”€β”€ oneplus/            # OnePlus tools
β”œβ”€β”€ xiaomi/             # Xiaomi/MIUI tools
β”œβ”€β”€ huawei/             # Huawei/EMUI tools
β”œβ”€β”€ oppo/               # OPPO/ColorOS tools (NEW)
β”œβ”€β”€ vivo/               # Vivo/Funtouch tools (NEW)
β”œβ”€β”€ realme/             # Realme tools (NEW)
β”œβ”€β”€ motorola/           # Motorola tools
β”œβ”€β”€ nothing/            # Nothing Phone tools (NEW)
β”œβ”€β”€ asus/               # ASUS ROG tools (NEW)
β”œβ”€β”€ lg/                 # LG tools
β”œβ”€β”€ sony/               # Sony tools
β”œβ”€β”€ nokia/              # Nokia tools
β”œβ”€β”€ zte/                # ZTE tools (NEW)
β”œβ”€β”€ fairphone/          # Fairphone tools (NEW)
β”œβ”€β”€ tcl/                # TCL tools (NEW)
β”‚
β”œβ”€β”€ baseband/           # Modem/baseband tools (NEW)
β”œβ”€β”€ cellular/           # 5G/LTE tools (NEW)
β”œβ”€β”€ trustzone/          # TEE research tools (NEW)
β”œβ”€β”€ bootrom/            # BootROM tools (NEW)
β”œβ”€β”€ secure-element/     # SE research (NEW)
β”‚
β”œβ”€β”€ firmware/           # Firmware utilities
β”œβ”€β”€ installer/          # Platform installers
β”œβ”€β”€ plugins/            # Plugin system (NEW)
β”œβ”€β”€ gui/                # GUI components (NEW)
└── tools/              # Common utilities

πŸ”Œ Plugin System (NEW)

Extend NullKia with custom modules:

# List available plugins
nullkia plugin list

# Install community plugin
nullkia plugin install samsung-advanced
nullkia plugin install mtk-bypass

# Create your own plugin
nullkia plugin create my-plugin

Plugin Structure

plugins/my-plugin/
β”œβ”€β”€ manifest.json       # Plugin metadata
β”œβ”€β”€ main.py             # Entry point
β”œβ”€β”€ commands/           # CLI commands
└── lib/                # Supporting code

πŸ–₯️ GUI Mode (NEW)

Launch the graphical interface:

nullkia --gui

Features:

  • Device detection dashboard
  • One-click operations
  • Firmware browser
  • Log viewer
  • Theme support (dark/light)

πŸ” Encryption Keys

Some features require encryption keys available exclusively on our Discord:

πŸ”‘ discord.gg/killers

  • Knox bypass keys
  • Firmware decryption keys
  • EDL firehose loaders
  • Bootloader unlock tokens
  • Baseband research tools
  • eSIM provisioning keys

πŸ› οΈ Requirements

Platform Requirements
Linux adb, fastboot, libusb, python3
macOS Homebrew, android-platform-tools
Windows USB drivers, PowerShell 5+
Termux android-tools package
Docker Docker Desktop with USB passthrough
GUI GTK3 or Qt5

πŸ“‹ Changelog

v3.0.0 (January 2026)

  • Added 8 new manufacturers (Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL)
  • Baseband exploitation tools (Shannon, Qualcomm, MediaTek)
  • eSIM/eUICC tools
  • 5G/LTE security analysis
  • TrustZone/TEE research tools
  • BootROM extraction (where supported)
  • Secure Element research
  • GUI mode
  • Plugin system
  • iOS 17/18 support
  • Android 14/15 support

v2.0.0 (2025)

  • Multi-manufacturer support
  • Docker support
  • Cross-platform installers

v1.0.0 (2024)

  • Initial release
  • Samsung, Apple, Google support

⚠️ Disclaimer

This tool is for security research and educational purposes only. Use responsibly and only on devices you own or have explicit permission to test. The authors are not responsible for any misuse or damage.


πŸ“œ License

MIT License - @bad-antics