Proteas / ios-8.1.2-jb-userland
ref: https://proteaswang.blogspot.com/2017/04/jailbreak-ios-812-and-analyze-related.html
☆12Updated 6 years ago
Alternatives and similar repositories for ios-8.1.2-jb-userland:
Users that are interested in ios-8.1.2-jb-userland are comparing it to the libraries listed below
- iOS10~iOS13 Edition) Dump Kext information from iOS kernel cache. Applicable to the kernel which dump from memory. The disassembly framew…☆20Updated 3 years ago
- A collection of CVE POC code☆11Updated 5 years ago
- This tool will help to fix the Mach-O header of iOS kernel which dump from the memory. So that IDA or function symbol-related tools can l…☆23Updated 8 years ago
- Radare2 plugin to parse modern iOS 64-bit kernel caches☆29Updated 6 years ago
- ios kernel class tree☆23Updated 5 years ago
- CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.☆28Updated 7 years ago
- Reexport symbols for Mach-O and ELF☆38Updated 7 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Updated 6 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆31Updated 4 years ago
- Sniffing on port messages☆25Updated 8 years ago
- runtime spy elf with android/linux and macho with macOS/IOS☆34Updated 8 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆24Updated 6 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆19Updated 5 years ago
- on Mac 10.12.2☆18Updated 6 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Updated 5 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes☆26Updated 4 years ago
- A plugin for Binary Ninja containing tools for iOS reversing☆29Updated 7 years ago
- Binary Format of iOS 13 Sandbox Profile Collection☆51Updated 5 years ago
- Checks macOS for Kernel Task Port. It may help detect intrusive kexts that would leak the kernel task.☆21Updated 2 years ago
- Inject a DyLib to an existing Mach-O file☆23Updated 9 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆27Updated 6 years ago
- empty_list - exploit for p0 issue 1564 (CVE-2018-4243) iOS 11.0 - 11.3.1 kernel r/w☆19Updated 6 years ago
- xnu-10.10 mach-o loader that compiles in userland☆17Updated 9 years ago
- ☆18Updated 3 years ago
- iOS 11.3.1 exploit☆47Updated 6 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆66Updated 4 years ago
- iOS Userland Forensic Dumping Framework for iOS 7/8☆19Updated 6 years ago
- IDAPython scripts☆10Updated 3 years ago
- A NEW 64-bit JAILBREAK FOR iOS 10.3,10.3.1,10.3.2,10.3.x. (Untethered).☆44Updated 7 years ago
- ☆11Updated 3 years ago