watsonkp / binaryninja-ios-toolsLinks
A plugin for Binary Ninja containing tools for iOS reversing
☆29Updated 7 years ago
Alternatives and similar repositories for binaryninja-ios-tools
Users that are interested in binaryninja-ios-tools are comparing it to the libraries listed below
Sorting:
- load iOS12 kernelcaches and PAC code in IDA☆60Updated 6 years ago
- CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.☆54Updated 6 years ago
- CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.☆28Updated 7 years ago
- Slides from my conference presentations.☆80Updated 4 years ago
- A fuzzer for the iOS kernel and userland☆44Updated 6 years ago
- Radare2 plugin to parse modern iOS 64-bit kernel caches☆29Updated 6 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Updated 5 years ago
- This tool will help to fix the Mach-O header of iOS kernel which dump from the memory. So that IDA or function symbol-related tools can l…☆23Updated 8 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes☆26Updated 4 years ago
- Reexport symbols for Mach-O and ELF☆38Updated 7 years ago
- A new XNU kernel fuzzer with some extra features.☆13Updated 8 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Updated 6 years ago
- PoC for the iOS 11.4.1 and MacOS 10.13 kernel vulnerability in lio_listio☆76Updated 6 years ago
- ios kernel class tree☆23Updated 6 years ago
- Binary Format of iOS 13 Sandbox Profile Collection☆51Updated 5 years ago
- Research into Apple PPP and CCL components☆19Updated 5 years ago
- Research into Security of Apple Smart Keyboard and Apple Pencil☆36Updated 6 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.☆59Updated 6 years ago
- ios iokit fuzzer (really probably isn't that useful anymore tbh)☆62Updated 8 years ago
- CVE-2018-4087 PoC☆59Updated 6 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆31Updated 4 years ago
- Sniffing on port messages☆25Updated 8 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Updated 6 years ago
- radare2-lldb integration☆62Updated 6 years ago
- A collection of CVE POC code☆11Updated 5 years ago
- Collection of (at time of release) iOS bugs I found☆54Updated 5 years ago
- ☆31Updated 6 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆24Updated 6 years ago
- Dump Kext information from Macos. Support batch analysis. The disassembly framework used is Capstone☆43Updated 7 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆45Updated 6 years ago