malus-security / ios-sandbox-profiles
Reversed iOS sandbox profile files
☆25Updated 4 years ago
Alternatives and similar repositories for ios-sandbox-profiles:
Users that are interested in ios-sandbox-profiles are comparing it to the libraries listed below
- Auto updated libimobiledevice Github Actions package☆12Updated this week
- A custom shellcode hook for checkra1n 0.1337 written in c!☆38Updated last year
- An *OS bootchain patching library.☆16Updated last week
- LZVN compression/decompression tool☆15Updated 4 years ago
- IDA loader to help with SEPROM reverse engineering.☆33Updated 2 months ago
- PCIDriverKit proof-of-concept for CVE-2022-26763☆38Updated 2 years ago
- ☆36Updated last year
- some research results of sep☆19Updated 3 years ago
- A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.☆16Updated 2 months ago
- Binary Ninja loader for A12 SEP firmware☆26Updated 4 years ago
- arm64 IOKit class dumper☆16Updated last year
- A python lib for manipulating IMG4, IM4M and IM4P files☆12Updated last year
- A simple nodejs server that acts as a keystore for Grandmaster.☆21Updated 5 years ago
- A working busybox for iOS and macOS☆31Updated 2 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Updated 5 years ago
- iBoot/SecureROM Loader☆32Updated last year
- Binary Ninja loader for 64 bits Apple SEPROMs☆50Updated 8 months ago
- Plugin for loading MachO kernelcache and dSYM files to Binary Ninja☆34Updated 6 months ago
- Interact with trustcaches☆39Updated 2 years ago
- extract various firmware blobs from iBoot☆42Updated 4 years ago
- ☆17Updated 2 years ago
- Find some iBoot functions in an iBoot64.☆41Updated 4 years ago
- Experimentation environment for checkm8-vulnerable devices☆53Updated last year
- A tool to call CoreTrust evaluation from userland☆16Updated 9 months ago
- Tool to patch the ASLR slide generation in the kernel to disable user-land ASLR on 32-bit iOS☆34Updated 4 years ago
- experimental iOS debugger☆26Updated 4 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆26Updated 6 years ago
- symbol dumps of iOS shared caches☆33Updated 2 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆65Updated 3 years ago
- Private headers & entitlements for daemons, frameworks, applications private frameworks and more for iOS 17.0 21A328☆19Updated last year