Eureka bootloader replica for attempting to find an exploit
This project emulates the Meta Quest bootloader’s CheckToken() logic and provides an attacker harness to test bypass strategies.
-
Install dependencies: pip install cryptography
-
Place your public key into
keys/public.pem -
Configure your serial in
config.json -
Run verifier directly: python verifier.py
-
Run attacker fuzz harness: python attacker.py