ronwai / dsctool
Hopper plugin to analyze ObjC runtime structures in the dyld_shared_cache
☆24Updated 3 years ago
Alternatives and similar repositories for dsctool:
Users that are interested in dsctool are comparing it to the libraries listed below
- ☆21Updated last year
- App sandbox escapes for macOS☆28Updated 4 years ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆74Updated 10 months ago
- Linking against PrivateFrameworks on macOS.☆17Updated 3 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆66Updated 4 years ago
- ☆36Updated last year
- My collection of PoCs☆25Updated last year
- Apple runtime introspection tools☆20Updated 3 months ago
- Extract Binaries from Apple's DYLD Shared Cache☆18Updated last year
- Guessed headers of non-public Apple SDK☆25Updated last month
- XPC sniffer using LLDB☆43Updated 4 months ago
- CLI frontend for com.apple.decmpfs / AppleFSCompression.framework☆30Updated 2 years ago
- A tool to parse Apple's binary device tree format.☆54Updated 4 years ago
- Mach-O view plugin☆20Updated 11 months ago
- PCIDriverKit proof-of-concept for CVE-2022-26763☆38Updated 2 years ago
- Sniff XPC goodies on your iOS device.☆87Updated 4 years ago
- An Apple Silicon hooking library written in C☆14Updated 3 years ago
- Workaround for the 4 0-days: https://github.com/illusionofchaos/ios-gamed-0day https://github.com/illusionofchaos/ios-nehelper-wifi-info-…☆29Updated 3 years ago
- ☆18Updated 3 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆10Updated 2 years ago
- Tool for reverse-engineering Apple's sandbox☆56Updated 7 years ago
- One-Click to Completely Take Over A macOS Device☆17Updated 2 years ago
- Apple's XNU automatically updated live.☆25Updated 3 years ago
- Scripts + patches to pwn vma2 (Virtualization.framework) macOS virtual machines☆51Updated 8 months ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.☆58Updated 6 years ago
- Accessing physical memory on iOS.☆51Updated 4 years ago
- Dump non-encrypted iOS device tree extracted from im4p☆40Updated 2 years ago
- symbol dumps of iOS shared caches☆33Updated 2 years ago
- Generates a research variant of the iOS SDK for use with SRD development☆21Updated last month
- Slides and resources for talks I've given☆15Updated 7 months ago