shinvou / decrypt0r
Automatically download and decrypt SecureRom stuff (iBSS, iBEC, iBoot, etc.) for all iOS versions available.
☆50Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for decrypt0r
- iOS ARM64 kernel patchfinder☆74Updated 5 years ago
- Research on Apple's USB protocols☆30Updated 5 years ago
- A fuzzer for the iOS kernel and userland☆44Updated 6 years ago
- iBoot64 Payload Development Toolkit☆42Updated 7 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆16Updated 5 years ago
- not a jailbreak☆35Updated 6 years ago
- Extract a decrypted iOS 64-bit kernelcache☆41Updated this week
- Find some iBoot functions in an iBoot64.☆41Updated 3 years ago
- a tool that decompress the kernel cache once dercypted☆10Updated 7 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆65Updated 7 years ago
- WIP iOS 11 - 12.2 & 13b1,b2 Safari Jailbreak☆43Updated 4 years ago
- ☆35Updated last year
- ios iokit fuzzer (really probably isn't that useful anymore tbh)☆61Updated 7 years ago
- IDA loader to help with SEPROM reverse engineering.☆32Updated 5 months ago
- ☆20Updated 6 years ago
- Obtains the kernel task port and establishes a kernel function calling primitive on the iPhone XS, iPhone XR, and iPhone 8 running iOS 12…☆28Updated 5 years ago
- extract various firmware blobs from iBoot☆42Updated 4 years ago
- Providing a great interface to the iOS kernel, hardware, threads and processes in a great research environment. (WIP)☆29Updated 5 years ago
- CVE-2018-4331: Exploit for a race condition in the GSSCred system service on iOS 11.2.☆24Updated 6 years ago
- Unstripped iOS kernel extensions and more. More coming soon.☆57Updated 4 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆26Updated 6 years ago
- Accessing physical memory on iOS.☆49Updated 4 years ago
- iBoot Payload Development Toolkit☆40Updated 7 years ago
- Tool for getting and setting nonce without triggering KPP/KTRR/PAC.☆109Updated last year
- Binary Ninja loader for A12 SEP firmware☆26Updated 3 years ago
- ☆31Updated 5 years ago
- iOS-related command line goodies☆52Updated 5 years ago
- CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.☆52Updated 6 years ago
- Dump non-encrypted iOS device tree extracted from im4p☆40Updated 2 years ago