nowsecure / airspy
AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server's perspective. Released during BH USA 2019 Training https://www.nowsecure.com/event/advanced-frida-and-radare-a-hackers-delight/
☆145Updated last year
Related projects: ⓘ
- Example showing how to use Frida for standalone injection of a custom payload☆154Updated 4 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆109Updated 5 years ago
- Breaking the iCloud Keychain Artifacts☆92Updated 8 months ago
- SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some…☆54Updated 3 years ago
- r2-based tool to decrypt iOS applications☆36Updated 8 years ago
- Sniff XPC goodies on your iOS device.☆82Updated 3 years ago
- Apple hardware secrets☆113Updated last year
- Swizzler2 - Hacking iOS applications☆152Updated 7 years ago
- A simplistic python tool that assists in automating iOS firmware decryption.☆86Updated 4 years ago
- An automated wrapper script for patching iOS applications (IPA files) and work on non-jailbroken device☆119Updated 6 years ago
- Grab your libboringssl keys to decrypt traffic (pcaps)☆58Updated 4 years ago
- ☆73Updated this week
- Doyensec theme for the Hopper Disassembler - chill and functional for long RE nights☆55Updated 7 years ago
- Python script to SSH into your jailbroken device, decrypt an iOS App and transfer it to your local machine☆89Updated 5 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆65Updated 3 years ago
- ☆102Updated 2 months ago
- Frida library for interacting with Swift programs. Superseded by https://github.com/frida/frida-swift-bridge☆97Updated 5 years ago
- Inspect and manipulate UIKit-based GUIs through Frida.☆54Updated 7 months ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesign…☆245Updated 5 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆78Updated 4 years ago
- tree but for Objective-C messages.☆113Updated 8 months ago
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆71Updated 7 months ago
- Accessing physical memory on iOS.☆49Updated 3 years ago
- iOS-related command line goodies☆52Updated 5 years ago
- Collection of (at time of release) iOS bugs I found☆54Updated 4 years ago
- Decrypt iOS binaries at runtime☆69Updated 2 years ago
- Log iOS network traffic without a proxy☆122Updated last year
- ☆43Updated this week
- An iOS kernel exploit for iOS 11 through 12.1.2. Non-SMAP (<=A9) devices only.☆80Updated 5 years ago
- A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.☆92Updated 7 years ago