0xmachos / iOS-Security-GuidesLinks
Every iOS security guide
☆268Updated 5 years ago
Alternatives and similar repositories for iOS-Security-Guides
Users that are interested in iOS-Security-Guides are comparing it to the libraries listed below
Sorting:
- class-dump binaries for Objc and Swift apps☆75Updated 7 years ago
- Collection of scripts I use in the Hopper disassembler☆111Updated 9 years ago
- Every Apple Platform Security Guide☆164Updated last year
- Python script to SSH into your jailbroken device, decrypt an iOS App and transfer it to your local machine☆93Updated 6 years ago
- ARM Assembly Reference Manual for iOS, iPadOS, and macOS.☆213Updated 5 years ago
- small proof of concept gui for auditing iOS applications based on objection☆154Updated 7 years ago
- A CLI to interact with iOS's keychain on a jailbroken device to dump/edit/delete a keychain item.☆206Updated 5 years ago
- Frida library for interacting with Swift programs. Superseded by https://github.com/frida/frida-swift-bridge☆100Updated 7 years ago
- Secure example of an XPC helper written in Swift☆108Updated 5 years ago
- A macOS <= 10.14.3 Keychain exploit☆248Updated 6 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesign…☆256Updated 7 years ago
- ☆378Updated 6 years ago
- Sniff XPC goodies on your iOS device.☆92Updated 5 years ago
- Dump Kext information from iOS kernel cache. Applicable to the kernel which dump from memory☆88Updated 8 years ago
- Frida Swift bindings☆162Updated this week
- Modifications to Apple's dyld project to fix Objective-C information when extracting dyld_shared_cache from macOS Big Sur to help Hopper …☆149Updated 5 years ago
- Mach-O & Universal Binary Parser☆148Updated 3 years ago
- Breaking the iCloud Keychain Artifacts☆105Updated last year
- codesign bypass (get out of rop without JIT)☆148Updated 9 years ago
- Automated Binary Analysis on iOS☆110Updated 7 years ago
- arm64 architecture handler☆177Updated 5 years ago
- Command line utility that interacts with plugged in iOS devices. Uses Apple's MobileDevice framework☆125Updated last year
- AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server…☆148Updated 2 years ago
- An iOS kernel exploit designated to work on all iOS devices <= 10.3.1☆334Updated 8 years ago
- Swift Apps Reverse Engineering reading book☆139Updated 8 years ago
- Toolkit for binary iOS / OS X sandbox profiles☆145Updated 10 years ago
- Every OS X/ macOS white paper☆114Updated 5 years ago
- Swizzler2 - Hacking iOS applications☆161Updated 8 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆166Updated 5 years ago
- Unstripped iOS Kernels☆219Updated 5 years ago