CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalation (CVE-2025-31201), and allowed token theft until patched in iOS 18.4.1 (Apr 16, 2025).
☆189Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
Users that are interested in iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- poc for CVE-2023-40448 (under construction) ,This could probably be a piece for a jailbreak☆11Jan 31, 2025Updated last year
- Escape macOS Sandbox using sharedfilelistd exploit☆63Jun 28, 2025Updated 8 months ago
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Pishi is a code coverage tool like kcov for macOS.☆76Apr 17, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- iOS 9.0(?)~17.0b1 arm64/arm64e krw☆26Apr 2, 2024Updated last year
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 7 months ago
- AppArmor and Seccomp profiles for Docker images☆14Dec 9, 2025Updated 3 months ago
- ☆17Aug 5, 2021Updated 4 years ago
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 9 months ago
- Basic EFI with Opencore for Intel Coffee Lake Refresh Processors (9th Gen)☆10Mar 5, 2026Updated 3 weeks ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Robust Frida-based tool to dump decrypted iOS apps as .ipa from a jailbroken device supports App Store, sideloaded and system.☆86Mar 20, 2026Updated last week
- ☆15May 12, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 抽奖h5页面☆10Jul 13, 2017Updated 8 years ago
- skin unlocker for aimlab☆10Aug 6, 2025Updated 7 months ago
- install new, update or remove ISO files from your Ventoy device☆16Dec 25, 2021Updated 4 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 11 months ago
- ☆26Oct 2, 2018Updated 7 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 7 months ago
- A centralized list of the various Potato Windows exploits.☆22Dec 30, 2024Updated last year
- Bug bounty bot for channel☆16Dec 10, 2022Updated 3 years ago
- exploit for cve-2025-43529☆68Jan 5, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CVE PoCs☆21Jul 16, 2020Updated 5 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Python script analysing Spotify Stream History data☆11Dec 30, 2024Updated last year
- ☆17Oct 15, 2024Updated last year
- ☆57Oct 22, 2025Updated 5 months ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆17Sep 25, 2025Updated 6 months ago
- Jailbreak Tweak for connecting to private servers on a certain anime game.☆13Jan 6, 2024Updated 2 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A web app to generate Spotify Refresh Token☆14Jul 14, 2020Updated 5 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆30Mar 19, 2026Updated last week
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆209Nov 18, 2025Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆53May 13, 2024Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago