dhinakg / pcc-researchLinks
Apple PCC research
☆16Updated 3 months ago
Alternatives and similar repositories for pcc-research
Users that are interested in pcc-research are comparing it to the libraries listed below
Sorting:
- PCIDriverKit proof-of-concept for CVE-2022-26763☆38Updated 2 years ago
- ☆17Updated 3 years ago
- A working busybox for iOS and macOS☆32Updated 2 years ago
- IDAPython scripts☆10Updated 4 years ago
- Learning how to use IOSurfaceAccelerator☆24Updated 2 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆13Updated 3 years ago
- Mach-O view plugin☆20Updated last year
- arm64 and arm64e dylib injector☆36Updated last year
- some research results of sep☆20Updated 4 years ago
- C Library for Apple Firmware (Amalgam)☆28Updated 3 years ago
- WebKit/JSC CodeQL Databases☆17Updated last month
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆19Updated 2 years ago
- A mirror of Apple's cctools open source dump with buildable branches☆12Updated last month
- arm64 IOKit class dumper☆18Updated 4 months ago
- iOS 13.5 ✌️☆43Updated last month
- ☆22Updated last year
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆31Updated 4 years ago
- A simple nodejs server that acts as a keystore for Grandmaster.☆21Updated 5 years ago
- Homebrew Bottle Downloader☆17Updated last week
- Linking against PrivateFrameworks on macOS.☆20Updated 3 years ago
- Apple Silicon NOR dumper☆48Updated last year
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆37Updated last month
- powdersn0w pub☆21Updated 2 years ago
- ☆11Updated 3 years ago
- Modern C++, range-based Mach-O parser designed for embedded use. Uses stack allocations only.☆33Updated 2 years ago
- Library handling the communication with Apple's Tatsu Signing Server (TSS)☆10Updated 3 months ago
- A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.☆19Updated 6 months ago
- slightly modified version of jonathan levins lsdtrip bin available at http://newosxbook.com/tools/lsdtrip.html☆19Updated last year
- Extract Binaries from Apple's DYLD Shared Cache☆19Updated last year
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Updated 2 weeks ago