0x7ff / xpcy
A tool for listing/reversing XPC services inside container sandbox. Reference: https://www.blackhat.com/docs/us-15/materials/us-15-Wang-Review-And-Exploit-Neglected-Attack-Surface-In-iOS-8.pdf
☆22Updated 6 years ago
Alternatives and similar repositories for xpcy:
Users that are interested in xpcy are comparing it to the libraries listed below
- A tool for extracting kernel extensions from the iOS 12's new kernelcache format.☆12Updated 6 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆24Updated 6 years ago
- Accessing physical memory on iOS.☆50Updated 4 years ago
- iOS-related command line goodies☆56Updated 5 years ago
- ☆36Updated 3 weeks ago
- See https://github.com/0x7ff/iBootMaybeDumper/issues/1#issuecomment-426731516 for more info.☆20Updated 6 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆26Updated 6 years ago
- Binary Format of iOS 13 Sandbox Profile Collection☆51Updated 5 years ago
- Research on Apple's USB protocols☆30Updated 5 years ago
- iOS Userland Forensic Dumping Framework for iOS 7/8☆19Updated 6 years ago
- You don't need to be as fast as lightspeed, but a run on a treadm1ll surely doesn't hurt.☆52Updated 5 years ago
- A fuzzer for the iOS kernel and userland☆44Updated 6 years ago
- getf tfp0 on iOS 11.2 - 11.4.1