IdanBanani / iOS-Vulnerability-ResearchLinks
Resources and writeups for studying & practicing iOS security
☆58Updated 3 years ago
Alternatives and similar repositories for iOS-Vulnerability-Research
Users that are interested in iOS-Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- Oversecured Vulnerable iOS App☆221Updated last year
- Slides and videos from my public speeches / conferences☆75Updated last month
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 3 years ago
- Fuzz iOS URL schemes☆121Updated last month
- ☆133Updated 3 years ago
- How to develop your own zero day vulnerabilities for iOS☆29Updated 2 years ago
- ☆32Updated 6 months ago
- ios tingz☆62Updated 3 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆46Updated 3 years ago
- ☆261Updated 2 weeks ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- macOS Security Research☆117Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- Slides & Hands-on for the reverse engineering workshop☆180Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆126Updated 8 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ARM64 macOS assembly program for null-byte free shellcode☆101Updated last month
- Slides and other material from various conference presentations.☆45Updated last month
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 6 months ago
- ☆115Updated last year
- ☆18Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆197Updated 2 years ago
- ☆69Updated 2 weeks ago
- ☆78Updated 4 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 5 months ago
- esoteric☆55Updated 4 years ago
- My Personal Reading lists for CVE Writeups☆36Updated 3 years ago