ant4g0nist / Vulnerable-Kext
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
☆230Updated 4 years ago
Alternatives and similar repositories for Vulnerable-Kext:
Users that are interested in Vulnerable-Kext are comparing it to the libraries listed below
- SSD Secure Disclosure Advisories☆167Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆405Updated 3 years ago
- ☆239Updated 3 years ago
- Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM☆147Updated 3 months ago
- ☆435Updated 4 months ago
- PoC☆209Updated last month
- A happy heap editor to support your exploitation process☆195Updated 3 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆312Updated last year
- ☆158Updated 5 years ago
- A Binary Ninja plugin for vulnerability research.☆288Updated 5 months ago
- Here is some resources about macOS/iOS system security.☆509Updated this week
- macOS Kernel Fuzzer☆258Updated 7 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆66Updated 3 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- kernel exploit for Apple iOS 13.X☆184Updated 4 years ago
- ☆134Updated 5 years ago
- ☆185Updated 2 years ago
- ☆132Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆144Updated last year
- Extreme Vulnerable IOKit driver☆89Updated 4 years ago
- Frida-based general purpose fuzzer☆213Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆181Updated 3 years ago
- ☆88Updated 6 years ago
- An IDA Toolkit for analyzing iOS kernelcaches.☆286Updated 4 years ago
- a Ghidra framework for iOS kernelcache reverse engineering☆346Updated 2 years ago
- VerSprite Security Research☆165Updated 2 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- ☆170Updated 4 years ago