JGoyd / Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201Links
Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), then WebKit(CVE-2025-24201) and Core Media(CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction.
☆24Updated 2 weeks ago
Alternatives and similar repositories for Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201
Users that are interested in Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201 are comparing it to the libraries listed below
Sorting:
- An XNU kernel race condition bug☆47Updated 10 months ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14Updated 2 years ago
- ☆19Updated 2 years ago
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆41Updated 6 months ago
- Escape macOS Sandbox using sharedfilelistd exploit☆63Updated 5 months ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆56Updated 2 years ago
- Slides for presentations held at conferences☆47Updated 2 years ago
- Pishi is a code coverage tool like kcov for macOS.☆73Updated 7 months ago
- ☆29Updated 2 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Updated last year
- ☆21Updated 11 months ago
- Diaphora Machine Learning tools and datasets☆23Updated last year
- ☆37Updated last year
- Exploit for CVE-2023-32364☆22Updated 2 years ago
- ☆123Updated last year
- ☆11Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆21Updated 3 months ago
- ☆35Updated 8 months ago
- ☆39Updated 4 months ago
- Mickey's Blogs☆42Updated last week
- Published security vulnerabilities for Apple platform with linked public repositories☆32Updated last year
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Updated 2 years ago
- ☆55Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- ☆15Updated 2 years ago
- Collection of my slide decks☆109Updated 5 years ago
- Collection of materials relating to FORCEDENTRY☆97Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- A Ghidra extension for reverse-engineering macOS binaries.☆19Updated 10 months ago
- ☆32Updated last month