GeoSn0w / iOS-10.1.1-Project-0-Exploit-ForkLinks
iOS 10.1.1 Project 0 Exploit Compatible with All arm64 devices for Jailbreak Development
☆58Updated 2 years ago
Alternatives and similar repositories for iOS-10.1.1-Project-0-Exploit-Fork
Users that are interested in iOS-10.1.1-Project-0-Exploit-Fork are comparing it to the libraries listed below
Sorting:
- A NEW 64-bit JAILBREAK FOR iOS 10.3,10.3.1,10.3.2,10.3.x. (Untethered).☆45Updated 8 years ago
- iOS-related command line goodies☆58Updated 6 years ago
- ios iokit fuzzer (really probably isn't that useful anymore tbh)☆62Updated 8 years ago
- CVE-2018-4087 PoC☆59Updated 6 years ago
- kernelcache encrypt/decrypt utility☆49Updated 13 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆110Updated 6 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆123Updated 12 years ago
- CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.☆86Updated 7 years ago
- Dealing with Mach-O kexts, vtables and more☆86Updated 6 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆43Updated 6 years ago
- A webbased jailbreak solution unifying existing jailbreak me solutions and new ones.☆90Updated 7 years ago
- iBoot64 Payload Development Toolkit☆42Updated 8 years ago
- Accessing physical memory on iOS.☆51Updated 5 years ago
- CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.☆54Updated 7 years ago
- 64-bit nonce setter for iOS 9.3.4-9.3.5☆95Updated 8 years ago
- A 0day exploit for ur0‘s apfs bug by me (Pwn20wnd)☆125Updated 7 years ago
- r2-based tool to decrypt iOS applications☆37Updated 9 years ago
- PoC for the iOS 11.4.1 and MacOS 10.13 kernel vulnerability in lio_listio☆77Updated 6 years ago
- GNU Debugger for jail broken IOS on arm64☆42Updated 8 years ago
- OS X 10.11.6 LPE PoC for CVE-2016-4655 / CVE-2016-4656☆98Updated 9 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.☆58Updated 6 years ago
- multi_path with root and sandbox escape☆101Updated 7 years ago
- async_awake with a bit of fun! - async_awake by Ian Beer (https://bugs.chromium.org/p/project-zero/issues/detail?id=1417#c3)☆47Updated 7 years ago
- SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some…☆57Updated 4 years ago
- Google Project Zero OS X Vul Report Analysis☆33Updated 8 years ago
- load iOS12 kernelcaches and PAC code in IDA☆60Updated 7 years ago
- ☆79Updated 8 years ago
- Lightweight version of xpwntool just for decrypting IMG3 firmware files☆47Updated 4 years ago
- Integer overflow in IOHIDDevice/IOUSBHIDDevice☆20Updated 9 years ago
- Inject a DyLib to an existing Mach-O file☆23Updated 10 years ago