๐Ÿ“ฑ NullKia

April 16, 2026 ยท View on GitHub

๐Ÿ“ฑ NullKia

Mobile Security Framework v3.0.0

GitHub License Devices Manufacturers

# NullKia โ€” Mobile Security Framework

 โ•šโ•โ•  โ•šโ•โ•โ•โ• โ•šโ•โ•โ•โ•โ•โ• โ•šโ•โ•โ•โ•โ•โ•โ•โ•šโ•โ•โ•โ•โ•โ•โ•โ•šโ•โ•  โ•šโ•โ•โ•šโ•โ•โ•šโ•โ•  โ•šโ•โ•
      [ MOBILE SECURITY FRAMEWORK v3.0 | bad-antics ]

๐Ÿ”“ Join github.com/bad-antics/nullkia/issues for encryption keys & firmware unlocks!


๐Ÿ†• What's New in v3.0

  • 8 New Manufacturers โ€” Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL
  • Baseband Exploitation โ€” Shannon/Exynos/Qualcomm modem tools
  • eSIM Tools โ€” eUICC provisioning and extraction
  • 5G/LTE Security โ€” Band locking, IMSI analysis, carrier unlock
  • iOS 17/18 Support โ€” Updated checkm8 toolchain
  • Android 14/15 Support โ€” New bypass techniques
  • GUI Mode โ€” Optional graphical interface
  • Plugin System โ€” Extend with custom modules

โšก Quick Install

Linux / macOS

curl -sL https://raw.githubusercontent.com/bad-antics/nullkia/main/get-nullkia.sh | bash

Windows (PowerShell as Admin)

iwr -useb https://raw.githubusercontent.com/bad-antics/nullkia/main/install.ps1 | iex

Android (Termux)

pkg install git && git clone https://github.com/bad-antics/nullkia && cd nullkia && make termux

Docker

docker run -it --privileged -v /dev/bus/usb:/dev/bus/usb ghcr.io/bad-antics/nullkia:3.0

GUI Mode

nullkia --gui    # Launches graphical interface

๐Ÿ“– Full Installation Guide


๐ŸŽฏ Features

FeatureDescription
๐Ÿ“ฑ 18 ManufacturersSamsung, Apple, Google, OnePlus, Xiaomi, Huawei, Motorola, LG, Sony, Nokia, Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL
โšก Device DetectionAuto-detect ADB, Fastboot, EDL, DFU, Download, BROM modes
๐Ÿ”“ Bootloader ToolsUnlock bootloaders across all manufacturers
๐Ÿ“ฆ Firmware UtilsDump, extract, flash, decrypt, and analyze firmware
๐Ÿ›ก๏ธ Security BypassKnox, Titan M, TrustZone, TEE research tools
๐Ÿ“ก Baseband ToolsModem exploitation, IMSI extraction, band manipulation
๐Ÿ“ถ Cellular Security5G/LTE analysis, carrier unlock, eSIM tools
๐Ÿ”ง Unbrick ToolsRecover hard-bricked devices
๐Ÿ–ฅ๏ธ Cross-PlatformLinux, macOS, Windows, Termux, Docker
๐ŸŽจ GUI ModeOptional graphical interface
๐Ÿ”Œ Plugin SystemExtend with custom modules

๐Ÿš€ Usage

# Show help
nullkia help

# Launch GUI mode
nullkia --gui

# Scan for connected devices
nullkia device scan
nullkia device info          # Detailed device information

# Samsung tools
nullkia samsung knox-bypass
nullkia samsung odin
nullkia samsung frp-bypass
nullkia samsung dump-efs     # NEW: Dump EFS partition

# Apple tools (checkm8 devices)
nullkia apple checkm8
nullkia apple dfu
nullkia apple activation     # NEW: Activation bypass
nullkia apple icloud         # NEW: iCloud tools

# Google Pixel
nullkia google titan-dump    # NEW: Titan M research
nullkia google avb-bypass    # NEW: AVB bypass

# Baseband/Modem (NEW)
nullkia baseband dump        # Dump modem firmware
nullkia baseband shannon     # Samsung Shannon exploits
nullkia baseband qualcomm    # Qualcomm modem tools
nullkia baseband analyze     # Analyze baseband binary

# Cellular/Network (NEW)
nullkia cellular unlock      # Carrier unlock
nullkia cellular bands       # Band manipulation
nullkia cellular esim        # eSIM extraction/provisioning
nullkia cellular imsi        # IMSI/IMEI analysis

# Firmware operations
nullkia firmware dump
nullkia firmware flash
nullkia firmware decrypt     # NEW: Decrypt firmware
nullkia firmware analyze
nullkia firmware diff        # NEW: Compare firmware versions

# Security research
nullkia trustzone dump       # NEW: TEE extraction
nullkia bootrom dump         # NEW: BootROM extraction
nullkia secure-element       # NEW: SE research

# Plugin system (NEW)
nullkia plugin list
nullkia plugin install <name>
nullkia plugin create <name>

# Reboot device
nullkia device reboot fastboot
nullkia device reboot recovery
nullkia device reboot edl
nullkia device reboot brom   # NEW: MediaTek BROM mode

๐Ÿ“ฑ Supported Manufacturers (18)

Tier 1 โ€” Full Support

ManufacturerDevicesFeatures
SamsungGalaxy S/Note/A/M/Z seriesKnox bypass, ODIN, FRP, EFS dump, Shannon baseband
AppleiPhone 4s โ†’ iPhone X (A5-A11)checkm8, DFU, activation bypass, iCloud tools
GooglePixel 1-9, TensorTitan M research, fastboot unlock, AVB bypass
OnePlusAll modelsMSM unbrick, OxygenOS tools, Engineering mode
XiaomiMi/Redmi/POCO/Black SharkMi Unlock bypass, EDL, MIUI flash, Secure boot

Tier 2 โ€” Extended Support

ManufacturerDevicesFeatures
HuaweiP/Mate/Nova (pre-2020)HiSuite, bootloader unlock, Kirin tools
OPPOFind/Reno/A seriesColorOS tools, MSM mode, test points
VivoX/V/Y seriesFuntouch tools, fastboot, EDL mode
RealmeGT/Number seriesRealme UI tools, deep testing
MotorolaEdge/G/RazrFastboot unlock, RSD Lite
NothingPhone (1)/(2)/(2a)Fastboot unlock, Nothing OS tools
ASUSROG Phone/ZenFoneAPX mode, unlock tools

Tier 3 โ€” Basic Support

ManufacturerDevicesFeatures
SonyXperia seriesFastboot unlock, Emma tools
LGLegacy devicesLAF mode, LGUP
NokiaAndroid devicesFastboot, OST tools
ZTEBlade/AxonMiFavor tools, EDL
FairphoneFP3/FP4/FP5Fastboot unlock (official)
TCL10/20/30 seriesTCL tools, EDL mode

๐Ÿ“ก Baseband Security (NEW in v3.0)

Supported Modems

VendorChipsetsCapabilities
QualcommSDX55, SDX65, X65, X70Firmware dump, diag mode, band lock
Samsung ShannonShannon 5100, 5123, 5300EFS dump, IMEI repair, NV extraction
MediaTekDimensity seriesBROM exploit, modem dump
Intel/AppleXMM 7560, 8160Legacy iPhone baseband
Exynos ModemExynos 5GResearch tools

Baseband Operations

# Dump modem firmware
nullkia baseband dump --output modem.bin

# Samsung Shannon specific
nullkia baseband shannon --extract-nv
nullkia baseband shannon --patch-imei

# Qualcomm diag mode
nullkia baseband qualcomm --diag-enable
nullkia baseband qualcomm --read-efs

# Band manipulation
nullkia cellular bands --lock "1,3,7,20,28"
nullkia cellular bands --unlock-all

# eSIM operations
nullkia cellular esim --dump-euicc
nullkia cellular esim --list-profiles

๐Ÿ” Security Research Tools (NEW)

TEE/TrustZone

# Dump TrustZone components
nullkia trustzone dump --output tz_dump/

# Extract secure world binaries
nullkia trustzone extract-ta    # Trusted Applications

# Analyze TEE
nullkia trustzone analyze

BootROM

# Dump BootROM (where supported)
nullkia bootrom dump --chipset exynos9825

# Exploit known vulnerabilities
nullkia bootrom exploit --checkm8    # Apple
nullkia bootrom exploit --mtk-brom   # MediaTek

Secure Element

# SE research (Titan M, Knox, etc.)
nullkia secure-element info
nullkia secure-element dump-attestation

๐Ÿ“‚ Project Structure

nullkia/
โ”œโ”€โ”€ install.sh          # Linux/macOS installer
โ”œโ”€โ”€ install.ps1         # Windows installer
โ”œโ”€โ”€ get-nullkia.sh      # One-line curl installer
โ”œโ”€โ”€ Dockerfile          # Docker support
โ”œโ”€โ”€ Makefile            # Build system
โ”œโ”€โ”€ INSTALL.md          # Installation guide
โ”‚
โ”œโ”€โ”€ samsung/            # Samsung/Knox tools
โ”œโ”€โ”€ apple/              # iOS/checkm8 tools
โ”œโ”€โ”€ google/             # Pixel/Titan M tools
โ”œโ”€โ”€ oneplus/            # OnePlus tools
โ”œโ”€โ”€ xiaomi/             # Xiaomi/MIUI tools
โ”œโ”€โ”€ huawei/             # Huawei/EMUI tools
โ”œโ”€โ”€ oppo/               # OPPO/ColorOS tools (NEW)
โ”œโ”€โ”€ vivo/               # Vivo/Funtouch tools (NEW)
โ”œโ”€โ”€ realme/             # Realme tools (NEW)
โ”œโ”€โ”€ motorola/           # Motorola tools
โ”œโ”€โ”€ nothing/            # Nothing Phone tools (NEW)
โ”œโ”€โ”€ asus/               # ASUS ROG tools (NEW)
โ”œโ”€โ”€ lg/                 # LG tools
โ”œโ”€โ”€ sony/               # Sony tools
โ”œโ”€โ”€ nokia/              # Nokia tools
โ”œโ”€โ”€ zte/                # ZTE tools (NEW)
โ”œโ”€โ”€ fairphone/          # Fairphone tools (NEW)
โ”œโ”€โ”€ tcl/                # TCL tools (NEW)
โ”‚
โ”œโ”€โ”€ baseband/           # Modem/baseband tools (NEW)
โ”œโ”€โ”€ cellular/           # 5G/LTE tools (NEW)
โ”œโ”€โ”€ trustzone/          # TEE research tools (NEW)
โ”œโ”€โ”€ bootrom/            # BootROM tools (NEW)
โ”œโ”€โ”€ secure-element/     # SE research (NEW)
โ”‚
โ”œโ”€โ”€ firmware/           # Firmware utilities
โ”œโ”€โ”€ installer/          # Platform installers
โ”œโ”€โ”€ plugins/            # Plugin system (NEW)
โ”œโ”€โ”€ gui/                # GUI components (NEW)
โ””โ”€โ”€ tools/              # Common utilities

๐Ÿ”Œ Plugin System (NEW)

Extend NullKia with custom modules:

# List available plugins
nullkia plugin list

# Install community plugin
nullkia plugin install samsung-advanced
nullkia plugin install mtk-bypass

# Create your own plugin
nullkia plugin create my-plugin

Plugin Structure

plugins/my-plugin/
โ”œโ”€โ”€ manifest.json       # Plugin metadata
โ”œโ”€โ”€ main.py             # Entry point
โ”œโ”€โ”€ commands/           # CLI commands
โ””โ”€โ”€ lib/                # Supporting code

๐Ÿ–ฅ๏ธ GUI Mode (NEW)

Launch the graphical interface:

nullkia --gui

Features:

  • Device detection dashboard
  • One-click operations
  • Firmware browser
  • Log viewer
  • Theme support (dark/light)

๐Ÿ” Encryption Keys

Some features require encryption keys. Request via GitHub Issues:

๐Ÿ”‘ Request Keys via Issues

  • Knox bypass keys
  • Firmware decryption keys
  • EDL firehose loaders
  • Bootloader unlock tokens
  • Baseband research tools
  • eSIM provisioning keys

๐Ÿ› ๏ธ Requirements

PlatformRequirements
Linuxadb, fastboot, libusb, python3
macOSHomebrew, android-platform-tools
WindowsUSB drivers, PowerShell 5+
Termuxandroid-tools package
DockerDocker Desktop with USB passthrough
GUIGTK3 or Qt5

๐Ÿ“‹ Changelog

v3.0.0 (January 2026)

  • Added 8 new manufacturers (Nothing, OPPO, Vivo, Realme, ASUS, ZTE, Fairphone, TCL)
  • Baseband exploitation tools (Shannon, Qualcomm, MediaTek)
  • eSIM/eUICC tools
  • 5G/LTE security analysis
  • TrustZone/TEE research tools
  • BootROM extraction (where supported)
  • Secure Element research
  • GUI mode
  • Plugin system
  • iOS 17/18 support
  • Android 14/15 support

v2.0.0 (2025)

  • Multi-manufacturer support
  • Docker support
  • Cross-platform installers

v1.0.0 (2024)

  • Initial release
  • Samsung, Apple, Google support

โš ๏ธ Disclaimer

This tool is for security research and educational purposes only. Use responsibly and only on devices you own or have explicit permission to test. The authors are not responsible for any misuse or damage.


๐Ÿ“œ License

MIT License - @bad-antics


โญ Star this repo | ๐Ÿ”‘ Request Keys | ๐Ÿ› Report Bug | ๐Ÿ“ฑ Device Request

GitHub

Part of the NullSec Linux ecosystem

๐Ÿ“ฑ Supported Devices

Samsung Galaxy

  • S24 Ultra, S24+, S24
  • S23 Ultra, S23+, S23
  • Z Fold 5, Z Flip 5
  • A54 5G, A34 5G

Apple iPhone

  • iPhone 15 Pro Max, 15 Pro, 15
  • iPhone 14 Pro Max, 14 Pro, 14
  • iPhone SE (3rd gen)

Google Pixel

  • Pixel 8 Pro, Pixel 8
  • Pixel 7 Pro, Pixel 7, Pixel 7a
  • Pixel 6 Pro, Pixel 6

๐Ÿ”ฌ Baseband Research

ModemManufacturerTools
ShannonSamsungshannon-dump, modem-decode
Snapdragon X75Qualcommqc-diag, mdm-flash
Dimensity 9300MediaTekmtk-exploit, brom-tools
Apple M3Appleiboot-extract, sep-dump