IdanBanani / iOS-Vulnerability-Research
Resources and writeups for studying & practicing iOS security
☆56Updated 3 years ago
Alternatives and similar repositories for iOS-Vulnerability-Research:
Users that are interested in iOS-Vulnerability-Research are comparing it to the libraries listed below
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- Slides and videos from my public speeches / conferences☆74Updated 3 weeks ago
- Fuzz iOS URL schemes☆113Updated 5 months ago
- Some presentations I did in the past☆65Updated 2 years ago
- Oversecured Vulnerable iOS App☆219Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 2 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆45Updated 3 years ago
- ☆52Updated 3 weeks ago
- ☆78Updated 2 months ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- An iOS app that lets you practice your Frida skills☆166Updated 2 years ago
- ☆256Updated 10 months ago
- How to develop your own zero day vulnerabilities for iOS☆28Updated last year
- ☆31Updated 4 months ago
- ios tingz☆62Updated 2 years ago
- A burp for intents wannabe☆69Updated 9 months ago
- Collection of materials relating to FORCEDENTRY☆96Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Slides and other material from various conference presentations.☆44Updated last month
- ☆115Updated 9 months ago
- ☆115Updated last year
- ☆28Updated 2 years ago
- macOS Security Research☆116Updated last year
- ☆22Updated 2 years ago
- CodeQL + DTrace = Memory Disclosure Vulnerabilities in XNU☆47Updated last year
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 6 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆193Updated 2 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated last month
- ☆55Updated 2 years ago