seemoo-lab / wireshark-awdl
Wireshark Dissector for Apple Wireless Direct Link (AWDL) and Apple's CoreCapture logging framework. Note: the AWDL dissector is part of Wireshark 3.0!
☆136Updated 6 years ago
Alternatives and similar repositories for wireshark-awdl:
Users that are interested in wireshark-awdl are comparing it to the libraries listed below
- Tunnels a regular TCP connection through an AWDL link by exploiting the NetService API☆33Updated 6 years ago
- Tools to explore the XPC interface of Apple's T2 chip☆163Updated 5 years ago
- AirSpy - Frida-based tool for exploring and tracking the evolution of Apple's AirDrop protocol implementation on i/macOS, from the server…☆147Updated 2 years ago
- Every Apple Platform Security Guide☆159Updated 7 months ago
- A macOS <= 10.14.3 Keychain exploit☆247Updated 5 years ago
- Reverse engineering toolkit for Apple's wireless ecosystem☆66Updated 3 years ago
- Breaking the iCloud Keychain Artifacts☆98Updated last year
- ☆239Updated 3 years ago
- Dev tools for probing IOKit☆200Updated last year
- Reversing the Apple sandbox☆235Updated last year
- Nmap for Bluetooth Low Energy☆184Updated 8 months ago
- Sniff XPC goodies on your iOS device.☆87Updated 4 years ago
- Utility to glitch and dump an AirTag☆162Updated 3 years ago
- ☆172Updated 4 years ago
- Automate extraction from iOS firmware files (.ipsw)☆200Updated this week
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆77Updated last year
- iOS <13.5 sandbox escape/entitlement 0day☆332Updated 5 months ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆109Updated 5 years ago
- Grab your libboringssl keys to decrypt traffic (pcaps)☆61Updated 4 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆78Updated 5 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆66Updated 4 years ago
- Integrity validator for iOS devices☆101Updated 6 years ago
- Bidirectional XPC message interception and more. Powered by Frida☆396Updated 2 years ago
- A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854☆84Updated 4 years ago
- Reverse engineering of Apple MultipeerConnectivity Framework☆107Updated 2 years ago
- macOS notes☆118Updated 5 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesign…☆252Updated 6 years ago
- ☆373Updated 5 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆163Updated 4 years ago
- A simplistic python tool that assists in automating iOS firmware decryption.☆87Updated 5 years ago