0x7ff / xpcy
A tool for listing/reversing XPC services inside container sandbox. Reference: https://www.blackhat.com/docs/us-15/materials/us-15-Wang-Review-And-Exploit-Neglected-Attack-Surface-In-iOS-8.pdf
☆22Updated 6 years ago
Alternatives and similar repositories for xpcy:
Users that are interested in xpcy are comparing it to the libraries listed below
- A tool for extracting kernel extensions from the iOS 12's new kernelcache format.☆12Updated 6 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆24Updated 6 years ago
- Accessing physical memory on iOS.☆51Updated 4 years ago
- See https://github.com/0x7ff/iBootMaybeDumper/issues/1#issuecomment-426731516 for more info.☆20Updated 6 years ago
- iOS-related command line goodies☆58Updated 5 years ago
- ☆37Updated 2 months ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆27Updated 6 years ago
- Binary Format of iOS 13 Sandbox Profile Collection☆51Updated 5 years ago
- A12 compatible, compile with make -f Makefile while in the directory☆15Updated 5 years ago
- experimental iOS debugger☆27Updated 4 years ago
- iOS Dropbear SSH☆44Updated 8 years ago
- Build files for things related to iOS☆39Updated 2 years ago
- Research on Apple's USB protocols☆30Updated 5 years ago
- iOS ARM64 kernel patchfinder☆29Updated 6 years ago
- iBoot Payload Development Toolkit☆40Updated 8 years ago
- getf tfp0 on iOS 11.2 - 11.4.1☆70Updated 6 years ago
- runtime spy elf with android/linux and macho with macOS/IOS☆34Updated 8 years ago
- Transform any ARM macho executable to a dynamic library☆77Updated 2 years ago
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Updated 6 years ago
- iOS Userland Forensic Dumping Framework for iOS 7/8☆19Updated 6 years ago
- iBoot64 Payload Development Toolkit☆42Updated 7 years ago
- empty_list - exploit for p0 issue 1564 (CVE-2018-4243) iOS 11.0 - 11.3.1 kernel r/w☆19Updated 6 years ago
- Change your kernel version☆35Updated 6 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆19Updated 5 years ago
- Dump non-encrypted iOS device tree extracted from im4p☆40Updated 2 years ago
- iOS10~iOS13 Edition) Dump Kext information from iOS kernel cache. Applicable to the kernel which dump from memory. The disassembly framew…☆20Updated 3 years ago
- You don't need to be as fast as lightspeed, but a run on a treadm1ll surely doesn't hurt.☆53Updated 5 years ago
- A tool to parse Apple's binary device tree format.☆55Updated 5 years ago
- Unofficial fork from saurik git repository git://git.saurik.com/ldid.git☆54Updated 3 years ago
- PCIDriverKit proof-of-concept for CVE-2022-26763☆38Updated 2 years ago