0xbf00 / macos-sandbox-coverageLinks
Tools to measure an app's App Sandbox usage
☆24Updated 5 years ago
Alternatives and similar repositories for macos-sandbox-coverage
Users that are interested in macos-sandbox-coverage are comparing it to the libraries listed below
Sorting:
- macOS Sandbox Profile Language (SBPL) Interpreter☆55Updated 5 years ago
- ☆14Updated 6 years ago
- dyld_shared_cache processing / Single-Image loading for BinaryNinja☆88Updated last year
- App sandbox escapes for macOS☆30Updated 5 years ago
- Apple's crashwrangler with support for Apple Silicon☆33Updated 4 years ago
- macOS XProtect definition files☆40Updated 3 years ago
- crashmon - A LLDB Based replacement for CrashWrangler☆46Updated last year
- A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854☆85Updated 5 years ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆80Updated last year
- XPC sniffer using LLDB☆47Updated last year
- Extract and generate code based on name and type for mig func/arg/request&reply member etc, ideal helper for creating monitor, tracker, f…☆17Updated 7 years ago
- Host your own *OS Entitlement Database☆54Updated 3 weeks ago
- One-Click to Completely Take Over A macOS Device☆17Updated 3 years ago
- Slides and resources for talks I've given☆15Updated last year
- macOS codesigning translocation vulnerability.☆42Updated 4 years ago
- Ghidra CI/CD to build and host a universal macOS Ghidra.app☆41Updated 2 months ago
- ☆37Updated 5 years ago
- ☆17Updated 3 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆84Updated 3 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Updated 7 years ago
- Slides from my conference presentations.☆80Updated 5 years ago
- DeviceTree☆81Updated last year
- Fuzzer for the Mac Kernel☆18Updated 12 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.☆58Updated 7 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆32Updated 4 years ago
- ☆12Updated 5 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆79Updated 5 years ago
- Reverse engineering toolkit for Apple's wireless ecosystem☆79Updated 4 years ago
- My collection of PoCs☆25Updated 2 years ago
- WebKit/JSC CodeQL Databases☆17Updated 2 weeks ago