arefttt / lzssdec
a tool that decompress the kernel cache once dercypted
☆11Updated 8 years ago
Alternatives and similar repositories for lzssdec:
Users that are interested in lzssdec are comparing it to the libraries listed below
- Automatically download and decrypt SecureRom stuff (iBSS, iBEC, iBoot, etc.) for all iOS versions available.☆51Updated 5 years ago
- iBoot Payload Development Toolkit☆40Updated 7 years ago
- A fuzzer for the iOS kernel and userland☆44Updated 6 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆65Updated 7 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆16Updated 5 years ago
- empty_list - exploit for p0 issue 1564 (CVE-2018-4243) iOS 11.0 - 11.3.1 kernel r/w☆19Updated 6 years ago
- iOS-related command line goodies☆55Updated 5 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆26Updated 6 years ago
- ART☆16Updated 7 years ago
- iBoot64 Payload Development Toolkit☆42Updated 7 years ago
- ☆36Updated last year
- ☆20Updated 6 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆23Updated 6 years ago
- experimental iOS debugger☆26Updated 4 years ago
- not a jailbreak☆35Updated 7 years ago
- ios iokit fuzzer (really probably isn't that useful anymore tbh)☆62Updated 7 years ago
- Research on Apple's USB protocols☆30Updated 5 years ago
- WIP iOS 11 - 12.2 & 13b1,b2 Safari Jailbreak☆43Updated 4 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14Updated 6 years ago
- get ready for 1212 jb hax☆10Updated 5 years ago
- just a kernelgrabber, for those who can't reach out of sandbox☆16Updated 10 months ago
- iOS ARM64 kernel patchfinder☆74Updated 5 years ago
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Updated 6 years ago
- extra_recipe research platform☆12Updated 7 years ago
- IDA loader to help with SEPROM reverse engineering.☆33Updated last month
- Mapping physical memory to user space (EL0) on iOS.☆70Updated 2 years ago
- Accessing physical memory on iOS.☆51Updated 4 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆32Updated 5 years ago
- ☆31Updated 5 years ago
- Dump non-encrypted iOS device tree extracted from im4p☆40Updated 2 years ago