xerub / separt
ART
☆16Updated 7 years ago
Alternatives and similar repositories for separt:
Users that are interested in separt are comparing it to the libraries listed below
- iBoot64 Payload Development Toolkit☆42Updated 7 years ago
- Identifies common functions in iBSS/iBEC/iBoot/LLB☆32Updated 9 years ago
- crappy "debugger"-like memory reader, to inspect 32bit ios kernel after it paniced☆15Updated 6 years ago
- not a jailbreak☆35Updated 7 years ago
- Dealing with Mach-O kexts, vtables and more☆85Updated 6 years ago
- iOS Userland Forensic Dumping Framework for iOS 7/8☆19Updated 6 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆66Updated 7 years ago
- Research on Apple's USB protocols☆30Updated 5 years ago
- simple serial console suitable for use with serialsh and iBoot☆46Updated 5 years ago
- iOS ARM64 kernel patchfinder☆75Updated 5 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆16Updated 5 years ago
- A fuzzer for the iOS kernel and userland☆44Updated 6 years ago
- CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.☆85Updated 7 years ago
- iBoot Payload Development Toolkit☆40Updated 7 years ago
- image4☆69Updated 6 years ago
- xnu exploitation toolkit☆16Updated 8 years ago
- get ready for 1212 jb hax☆10Updated 5 years ago
- Change your kernel version☆35Updated 6 years ago
- async_awake with a bit of fun! - async_awake by Ian Beer (https://bugs.chromium.org/p/project-zero/issues/detail?id=1417#c3)☆46Updated 7 years ago
- a tool that decompress the kernel cache once dercypted☆11Updated 8 years ago
- ☆36Updated last month
- A simple tool to find offsets needed in 32bit jailbreaks. Feel free to contribute.☆30Updated 7 years ago
- PoC for the iOS 11.4.1 and MacOS 10.13 kernel vulnerability in lio_listio☆76Updated 6 years ago
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Updated 6 years ago
- empty_list - exploit for p0 issue 1564 (CVE-2018-4243) iOS 11.0 - 11.3.1 kernel r/w☆19Updated 6 years ago
- You don't need to be as fast as lightspeed, but a run on a treadm1ll surely doesn't hurt.☆52Updated 5 years ago
- Dump non-encrypted iOS device tree extracted from im4p☆40Updated 2 years ago
- macOS kext for host_special_port(4) patch☆88Updated last year
- a convinient wrapper for iBoot32Patcher/iBoot64Patcher☆27Updated 6 months ago
- extra_recipe research platform☆12Updated 7 years ago