seemoo-lab / wireshark-awdl
Wireshark Dissector for Apple Wireless Direct Link (AWDL) and Apple's CoreCapture logging framework. Note: the AWDL dissector is part of Wireshark 3.0!
☆136Updated 6 years ago
Alternatives and similar repositories for wireshark-awdl:
Users that are interested in wireshark-awdl are comparing it to the libraries listed below
- Tools to explore the XPC interface of Apple's T2 chip☆162Updated 5 years ago
- Tunnels a regular TCP connection through an AWDL link by exploiting the NetService API☆32Updated 6 years ago
- AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server…☆146Updated 2 years ago
- Nmap for Bluetooth Low Energy☆181Updated 7 months ago
- Breaking the iCloud Keychain Artifacts☆95Updated last year
- ☆237Updated 3 years ago
- ☆71Updated 4 years ago
- Reversing the Apple sandbox☆235Updated last year
- Every Apple Platform Security Guide☆159Updated 5 months ago
- Reverse engineering toolkit for Apple's wireless ecosystem☆63Updated 3 years ago
- A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854☆84Updated 4 years ago
- Dev tools for probing IOKit☆199Updated last year
- Sniff XPC goodies on your iOS device.☆87Updated 4 years ago
- AirTag instrumentation including AirTechno and firmware downgrades.☆161Updated 2 weeks ago
- Example showing how to use Frida for standalone injection of a custom payload☆158Updated 4 years ago
- Apple's gdb fork with some fixes and enhancements☆56Updated 11 years ago
- Integrity validator for iOS devices☆101Updated 5 years ago
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆75Updated 11 months ago
- Apple Continuity Protocol Reverse Engineering and Dissector☆497Updated last year
- Reverse engineering of Apple MultipeerConnectivity Framework☆106Updated 2 years ago
- ☆114Updated 7 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆66Updated 4 years ago
- Toolkit developed to reverse engineer Google's Nearby Connections API☆23Updated 6 years ago
- Utility to extract files and keychain information from iOS backups☆124Updated last year
- r2-based tool to decrypt iOS applications☆37Updated 8 years ago
- ☆373Updated 5 years ago
- Extracting Apple ID Validation Record, Certificate, and Key for AirDrop☆105Updated last year
- Mach-O & Universal Binary Parser☆147Updated 2 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆109Updated 5 years ago
- App sandbox escapes for macOS☆28Updated 4 years ago