gdbinit / ExtractMachO
IDA plugin to extract Mach-O binaries located in the disassembly or data
☆57Updated 5 years ago
Related projects: ⓘ
- A tool to find gadgets in the iOS kernelcache.☆33Updated 6 years ago
- Google Project Zero OS X Vul Report Analysis☆33Updated 7 years ago
- Reexport symbols for Mach-O and ELF☆38Updated 6 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆18Updated 5 years ago
- Runtime code injection suite for exploring OS X process security☆37Updated 15 years ago
- An XNU kernel fuzz tool☆23Updated 14 years ago
- iBoot64 Payload Development Toolkit☆41Updated 7 years ago
- This tool will help to fix the Mach-O header of iOS kernel which dump from the memory. So that IDA or function symbol-related tools can l…☆22Updated 7 years ago
- CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.☆28Updated 6 years ago
- xnu-10.10 mach-o loader that compiles in userland☆17Updated 9 years ago
- Grab functions from radare2☆10Updated 7 years ago
- Dump Kext information from Macos. Support batch analysis. The disassembly framework used is Capstone☆43Updated 7 years ago
- iOS10~iOS13 Edition) Dump Kext information from iOS kernel cache. Applicable to the kernel which dump from memory. The disassembly framew…☆20Updated 2 years ago
- Extract a decrypted iOS 64-bit kernelcache☆41Updated this week
- kernelcache encrypt/decrypt utility☆48Updated 12 years ago
- Joker is used to export xnu kernel's syscall symbols.☆17Updated 9 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆30Updated 3 years ago
- Change your kernel version☆34Updated 5 years ago
- on Mac 10.12.2☆18Updated 6 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆26Updated 6 years ago
- simple radare2 rap:// server☆25Updated 8 years ago
- An OSX exploitation helper library.☆34Updated 8 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.☆58Updated 5 years ago
- Radare2 plugin to parse modern iOS 64-bit kernel caches☆29Updated 5 years ago
- runtime spy elf with android/linux and macho with macOS/IOS☆32Updated 7 years ago
- Inject a DyLib to an existing Mach-O file☆23Updated 8 years ago
- iOS 11.3.1 exploit☆47Updated 5 years ago
- A fuzzer for the iOS kernel and userland☆44Updated 6 years ago
- CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.☆52Updated 6 years ago
- ☆31Updated 5 years ago