NyanSatan / Virtual-iBoot-FunLinks
Another Virtualization.framework demo project, with focus to iBoot (WIP)
☆172Updated last year
Alternatives and similar repositories for Virtual-iBoot-Fun
Users that are interested in Virtual-iBoot-Fun are comparing it to the libraries listed below
Sorting:
- 64-bit iOS boot image patcher written in C☆146Updated 2 years ago
- Lib kernel r/w☆190Updated 3 years ago
- Fork of PongoOS which can be run in QEMU☆69Updated 4 years ago
- A tool to parse Apple's binary device tree format.☆56Updated 5 years ago
- arm64 IOKit class dumper☆278Updated 3 months ago
- IDA loader for Apple's 64 bits iBoot, SecureROM and AVPBooter☆156Updated 9 months ago
- DeviceTree☆80Updated 10 months ago
- Unstripped iOS kernel extensions and more. More coming soon.☆59Updated 5 years ago
- An iOS kernel debugger based on a KTRR bypass for A11 iPhones; works with LLDB and IDA Pro.☆56Updated 4 years ago
- Insecurity as an IOService☆91Updated 5 months ago
- 32/64 bit SecureROM/iBoot loader for IDA Pro. Also supports loading and decrypting encrypted .im4ps within IDA.☆74Updated 3 years ago
- Patch the iBoot64 with generic patches.☆53Updated last year
- Reversing the Apple sandbox☆147Updated 9 months ago
- Decompiling macOS Hypervisor.framework by hand☆129Updated 2 years ago
- iBoot/SEPOS decryption kit for JTAGgable iOS device prototypes☆114Updated 6 months ago
- Set of tools to interact with various aspects of Kanzi probe and its derivatives☆48Updated 11 months ago
- Spice - an unfinished iOS 11 untether☆114Updated 3 years ago
- xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities. This is an easy way to practice…☆57Updated 4 years ago
- A arm offsetfinder. It finds offsets, patches, parses Mach-O and even supports IMG4/IMG3☆149Updated 2 months ago
- Ghidra CI/CD to build and host a universal macOS Ghidra.app☆40Updated 3 weeks ago
- AEA metadata dumper☆48Updated 3 months ago
- ☆149Updated 3 years ago
- Apple SEP reverse☆53Updated 5 years ago
- Tool for getting and setting nonce without triggering KPP/KTRR/PAC.☆115Updated 2 years ago
- Lockdown related research, tools and POCs.☆91Updated 6 years ago
- ☆181Updated 4 years ago
- Automate extraction from iOS firmware files (.ipsw)☆210Updated 5 months ago
- Sniff XPC communication using Frida and Go☆146Updated last week
- iOS system call/Mach trap interception for checkra1n'able devices☆157Updated 4 years ago
- Binary Ninja loader for 64 bits Apple SEPROMs☆54Updated last month