corellium / ios_persistence_mappingLinks
Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"
☆11Updated 5 months ago
Alternatives and similar repositories for ios_persistence_mapping
Users that are interested in ios_persistence_mapping are comparing it to the libraries listed below
Sorting:
- ☆39Updated 9 months ago
- A collection of homebrew formula for the different thinking hacker☆33Updated last year
- A tool to download and decrypt a 64 bits iOS firmware images written in Rust☆44Updated last year
- CLI frontend for com.apple.decmpfs / AppleFSCompression.framework☆32Updated 3 years ago
- One-Click to Completely Take Over A macOS Device☆17Updated 3 years ago
- ☆15Updated 3 years ago
- arm64 IOKit class dumper☆18Updated 9 months ago
- Workaround for the 4 0-days: https://github.com/illusionofchaos/ios-gamed-0day https://github.com/illusionofchaos/ios-nehelper-wifi-info-…☆29Updated 4 years ago
- A python lib for manipulating IMG4, IM4M and IM4P files☆11Updated 2 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆23Updated 7 years ago
- Sniff XPC goodies on your iOS device.☆91Updated 5 years ago
- A simple nodejs server that acts as a keystore for Grandmaster.☆21Updated 5 years ago
- a patcher for making downgradable iOS 14 firmware☆38Updated 3 years ago
- Extract iOS firmware keys using on-device AES engine☆41Updated 3 years ago
- PCIDriverKit proof-of-concept for CVE-2022-26763☆37Updated 3 years ago
- 32/64 bit SecureROM/iBoot loader for IDA Pro. Also supports loading and decrypting encrypted .im4ps within IDA.☆73Updated 3 years ago
- A tool to parse Apple's binary device tree format.☆57Updated 5 years ago
- A tool for listing/reversing XPC services inside container sandbox. Reference: https://www.blackhat.com/docs/us-15/materials/us-15-Wang-R…☆22Updated 7 years ago
- Accessing physical memory on iOS.☆51Updated 5 years ago
- XPC sniffer using LLDB☆47Updated last year
- Apple runtime introspection tools☆20Updated last year
- Runs SIM-AKA Authentication on a jailbroken iPhone for VoLTE/VoWiFi/IMS research. Exposes a http interface compatible with fasferraz/USIM…☆20Updated 3 years ago
- A custom shellcode hook for checkra1n 0.1337 written in c!☆35Updated last year
- Experimentation environment for checkm8-vulnerable devices☆54Updated last year
- Build files for things related to iOS☆41Updated 3 years ago
- Mach-O view plugin☆20Updated last year
- Transform any ARM macho executable to a dynamic library☆77Updated 3 years ago
- A working busybox for iOS and macOS☆31Updated 3 years ago
- Welcome to Hoyt's SRD Repo for the Apple Security Research Device. Contribute Code or Open an Issue or Discussion.☆75Updated last year
- Binary Ninja loader for 64 bits Apple SEPROMs☆58Updated 2 months ago