zhuowei / PCICrashLinks
PCIDriverKit proof-of-concept for CVE-2022-26763
☆38Updated 3 years ago
Alternatives and similar repositories for PCICrash
Users that are interested in PCICrash are comparing it to the libraries listed below
Sorting:
- ☆39Updated 4 years ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Updated 5 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆31Updated 4 years ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆67Updated 4 years ago
- some research results of sep☆20Updated 4 years ago
- IDAPython scripts☆10Updated 4 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆24Updated 6 years ago
- Extract a decrypted iOS 64-bit kernelcache☆42Updated 3 weeks ago
- Binary Format of iOS 13 Sandbox Profile Collection☆51Updated 5 years ago
- ☆37Updated 4 months ago
- arm64 and arm64e dylib injector☆36Updated last year
- WebKit/JSC CodeQL Databases☆17Updated last month
- empty_list - exploit for p0 issue 1564 (CVE-2018-4243) iOS 11.0 - 11.3.1 kernel r/w☆19Updated 7 years ago
- arm64 IOKit class dumper☆18Updated 4 months ago
- ☆18Updated 4 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14Updated 7 years ago
- ☆54Updated 3 years ago
- Learning how to use IOSurfaceAccelerator☆24Updated 2 years ago
- extract various firmware blobs from iBoot☆45Updated 4 years ago
- LZVN compression/decompression tool☆15Updated 4 years ago
- IDA loader to help with SEPROM reverse engineering.☆33Updated 7 months ago
- Apple SEP reverse☆52Updated 5 years ago
- UPDATED: All the action is at https://github.com/xsscx/srd☆12Updated 4 years ago
- ios kernel class tree☆23Updated 6 years ago
- Auto updated libimobiledevice Github Actions package☆13Updated 3 months ago
- Binary Ninja loader for A12 SEP firmware☆28Updated 4 years ago
- An assistant for BinDiff☆26Updated 2 years ago
- CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.☆59Updated 6 years ago
- experimental iOS debugger☆28Updated 5 years ago
- Get kernel symbols on device. No jailbreak required (note: unslid addresses)☆27Updated 6 years ago