raymontag / chain3Links
☆51Updated 5 years ago
Alternatives and similar repositories for chain3
Users that are interested in chain3 are comparing it to the libraries listed below
Sorting:
- Slides from my conference presentations.☆81Updated 5 years ago
- ☆39Updated 4 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Updated 6 years ago
- Apple SEP reverse☆53Updated 5 years ago
- An assistant for BinDiff☆26Updated 2 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆66Updated 4 years ago
- An IDA Toolkit for analyzing iOS kernelcaches.☆111Updated 3 months ago
- CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.☆54Updated 7 years ago
- Extract a decrypted iOS 64-bit kernelcache☆42Updated last week
- PoC for the iOS 11.4.1 and MacOS 10.13 kernel vulnerability in lio_listio☆77Updated 6 years ago
- Host your own *OS Entitlement Database☆52Updated last week
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆31Updated 4 years ago
- A fuzzer for the iOS kernel and userland☆46Updated 7 years ago
- Extreme Vulnerable IOKit driver☆92Updated 4 years ago
- Binary View plugin for reverse engineering iBoot like binaries with Binary Ninja☆56Updated last year
- IDA plugin to find code cross references to virtual functions using PAC codes☆146Updated 3 years ago
- CVE-2018-4331: Exploit for a race condition in the GSSCred system service on iOS 11.2.☆24Updated 7 years ago
- p-joker -- iOS/MacOS kernelcache/kexts analysis tool☆111Updated 5 years ago
- extract various firmware blobs from iBoot☆46Updated 4 years ago
- xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities. This is an easy way to practice…☆57Updated 4 years ago
- ☆56Updated 3 years ago
- CVE-2020-27950 exploit☆34Updated 4 years ago
- WebKit/JSC CodeQL Databases☆17Updated last month
- load iOS12 kernelcaches and PAC code in IDA☆60Updated 6 years ago
- UPDATED: All the action is at https://github.com/xsscx/srd☆12Updated 4 years ago
- Binary Format of iOS 13 Sandbox Profile Collection☆51Updated 5 years ago
- Binary Ninja loader for A12 SEP firmware☆28Updated 4 years ago
- ☆42Updated 4 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆12Updated 6 years ago
- kernel exploit for Apple iOS 13.X☆186Updated 4 years ago