seemoo-lab / wireshark-awdlLinks
Wireshark Dissector for Apple Wireless Direct Link (AWDL) and Apple's CoreCapture logging framework. Note: the AWDL dissector is part of Wireshark 3.0!
☆140Updated 7 years ago
Alternatives and similar repositories for wireshark-awdl
Users that are interested in wireshark-awdl are comparing it to the libraries listed below
Sorting:
- Tools to explore the XPC interface of Apple's T2 chip☆166Updated 6 years ago
- AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server…☆148Updated 2 years ago
- ☆244Updated 4 years ago
- Breaking the iCloud Keychain Artifacts☆102Updated last year
- Reverse engineering of Apple MultipeerConnectivity Framework☆109Updated 3 years ago
- Tunnels a regular TCP connection through an AWDL link by exploiting the NetService API☆36Updated 7 years ago
- Reverse engineering toolkit for Apple's wireless ecosystem☆79Updated 4 years ago
- Reversing the Apple sandbox☆240Updated 6 months ago
- Apple's gdb fork with some fixes and enhancements☆57Updated 11 years ago
- Utility to glitch and dump an AirTag☆168Updated 4 years ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆62Updated 7 months ago
- Every Apple Platform Security Guide☆164Updated last year
- A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854☆85Updated 5 years ago
- Welcome to Hoyt's SRD Repo for the Apple Security Research Device. Contribute Code or Open an Issue or Discussion.☆75Updated last year
- Integrity validator for iOS devices☆100Updated 6 years ago
- A macOS <= 10.14.3 Keychain exploit☆248Updated 6 years ago
- Hacking the iPhone Baseband because we paid for it.☆112Updated 6 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆71Updated 5 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesign…☆257Updated 7 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆110Updated 6 years ago
- A library to execute code in the context of other processes on iOS 11.☆82Updated 7 years ago
- ☆178Updated 4 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆79Updated 5 years ago
- Research into Security of Apple Smart Keyboard and Apple Pencil☆35Updated 6 years ago
- A Wireshark dissector for the Apple Remote Invocation (ARI) protocol, used between Intel base band chips and the iOS CommCenter for vario…☆61Updated 2 months ago
- Example showing how to use Frida for standalone injection of a custom payload☆165Updated 5 years ago
- App sandbox escapes for macOS☆30Updated 5 years ago
- A simplistic python tool that assists in automating iOS firmware decryption.☆90Updated 5 years ago
- macOS Private KPI Symbol Resolver☆49Updated 8 years ago
- Sniff XPC goodies on your iOS device.☆91Updated 5 years ago