seemoo-lab / wireshark-awdl
Wireshark Dissector for Apple Wireless Direct Link (AWDL) and Apple's CoreCapture logging framework. Note: the AWDL dissector is part of Wireshark 3.0!
☆138Updated 6 years ago
Alternatives and similar repositories for wireshark-awdl:
Users that are interested in wireshark-awdl are comparing it to the libraries listed below
- Tunnels a regular TCP connection through an AWDL link by exploiting the NetService API☆34Updated 6 years ago
- Utility to glitch and dump an AirTag☆163Updated 3 years ago
- Tools to explore the XPC interface of Apple's T2 chip☆163Updated 5 years ago
- Nmap for Bluetooth Low Energy☆190Updated 9 months ago
- ☆240Updated 3 years ago
- Reverse engineering toolkit for Apple's wireless ecosystem☆66Updated 3 years ago
- ☆72Updated 4 years ago
- Breaking the iCloud Keychain Artifacts☆99Updated last year
- AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server…☆147Updated 2 years ago
- A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854☆85Updated 4 years ago
- A macOS <= 10.14.3 Keychain exploit☆246Updated 5 years ago
- Reverse engineering of Apple MultipeerConnectivity Framework☆107Updated 2 years ago
- AirTag instrumentation including AirTechno and firmware downgrades.☆166Updated 2 months ago
- iOS <13.5 sandbox escape/entitlement 0day☆333Updated 6 months ago
- ☆175Updated 4 years ago
- Integrity validator for iOS devices☆102Updated 6 years ago
- Reversing the Apple sandbox☆233Updated last year
- ☆374Updated 5 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆66Updated 4 years ago
- App sandbox escapes for macOS☆28Updated 4 years ago
- Utility to extract files and keychain information from iOS backups☆126Updated last year
- Welcome to Hoyt's SRD Repo for the Apple Security Research Device. Contribute Code or Open an Issue or Discussion.☆68Updated 6 months ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesign…☆254Updated 6 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆109Updated 6 years ago
- Bidirectional XPC message interception and more. Powered by Frida☆398Updated 2 years ago
- Sniff XPC goodies on your iOS device.☆88Updated 4 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆163Updated 4 years ago
- Dev tools for probing IOKit☆201Updated last year
- ☆97Updated 3 weeks ago
- Automate extraction from iOS firmware files (.ipsw)☆201Updated last month