impost0r / Rotten-Apples
macOS codesigning translocation vulnerability.
☆42Updated 3 years ago
Alternatives and similar repositories for Rotten-Apples:
Users that are interested in Rotten-Apples are comparing it to the libraries listed below
- ☆14Updated 6 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆30Updated 4 years ago
- ☆38Updated 5 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆57Updated 2 years ago
- My collection of PoCs☆26Updated last year
- Slides for presentations held at conferences☆45Updated 2 years ago
- ☆53Updated 3 years ago
- ☆39Updated 4 years ago
- App sandbox escapes for macOS☆28Updated 4 years ago
- Discover which process execute a hunted binary inside macOS☆24Updated 3 years ago
- ☆21Updated last year
- Tools to measure an app's App Sandbox usage☆24Updated 4 years ago
- Exploit for CVE-2023-32364☆21Updated last year
- Linking against PrivateFrameworks on macOS.☆17Updated 3 years ago
- Host your own *OS Entitlement Database☆44Updated 7 months ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆75Updated 11 months ago
- Binary View plugin for reverse engineering iBoot like binaries with Binary Ninja☆53Updated last year
- ☆28Updated last year
- One-Click to Completely Take Over A macOS Device☆17Updated 2 years ago
- RetDec plugin for LLDB. RetDec is a retargetable machine-code decompiler based on LLVM.☆63Updated last year
- A RootKit for macOS that can perform kernel read/write, hook kernel and userspace functions, set custom conditional breakpoints, etc☆23Updated 2 years ago
- An assistant for BinDiff☆24Updated 2 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆66Updated 4 years ago
- LZVN compression/decompression tool☆15Updated 4 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆82Updated 2 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆10Updated 2 years ago
- A Ghidra extension for reverse-engineering macOS binaries.☆17Updated 2 months ago
- ☆46Updated 8 months ago
- XPC sniffer using LLDB☆43Updated 5 months ago
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆15Updated 5 months ago