jevinskie / m1n1-xnu-bootLinks
A bootloader and experimentation playground for Apple Silicon. Modified to boot XNU/macOS kernels.
☆19Updated 3 years ago
Alternatives and similar repositories for m1n1-xnu-boot
Users that are interested in m1n1-xnu-boot are comparing it to the libraries listed below
Sorting:
- iOS 5.x iBoot fun for the whole family!☆43Updated 5 years ago
- SEP firmware splitter, made in rust.☆40Updated last year
- A lightweight ARM reverse engineering tool.☆23Updated last year
- Fork of PongoOS which can be run in QEMU☆69Updated 4 years ago
- Binary Ninja loader for 64 bits Apple SEPROMs☆57Updated last month
- Binary View plugin for reverse engineering iBoot like binaries with Binary Ninja☆54Updated last year
- Experimentation environment for checkm8-vulnerable devices☆54Updated last year
- a7 sep bug☆54Updated 2 years ago
- iBoot/SecureROM Loader☆34Updated 2 years ago
- Binary Ninja loader for A12 SEP firmware☆28Updated 4 years ago
- Plugin for loading MachO kernelcache and dSYM files to Binary Ninja☆39Updated 7 months ago
- A tool to pull C++ object names from kernel memory☆16Updated 4 years ago
- DeviceTree☆81Updated last year
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆84Updated last year
- xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities. This is an easy way to practice…☆56Updated 4 years ago
- An iOS kernel debugger based on a KTRR bypass for A11 iPhones; works with LLDB and IDA Pro.☆58Updated 4 years ago
- extract various firmware blobs from iBoot☆47Updated 5 years ago
- ☆42Updated 4 years ago
- Slides and resources for talks I've given☆15Updated last year
- ☆21Updated 2 years ago
- AEA metadata dumper☆48Updated 5 months ago
- A python lib for manipulating IMG4, IM4M and IM4P files☆11Updated last year
- some research results of sep☆20Updated 4 years ago
- Apple SEP reverse☆52Updated 5 years ago
- Apple Silicon NOR dumper☆48Updated last year
- A tool to parse Apple's binary device tree format.☆56Updated 5 years ago
- Mapping physical memory to user space (EL0) on iOS.☆73Updated 2 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆66Updated 4 years ago
- Tool for managing Image4 files.☆21Updated last year
- A working busybox for iOS and macOS☆32Updated 2 years ago