IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes https://github.com/Antid0teCom/aarch64_mte #ida #reverse #ios #arm #dukeBarman
GitHub
GitHub - Antid0teCom/aarch64_mte: IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension…
IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes - Antid0teCom/aarch64_mte
Binary Ninja loader for 64 bits SEPROMs https://github.com/matteyeux/seprom-loader #reverse #ios #binaryninja #dukeBarman
GitHub
GitHub - matteyeux/seprom-loader: Binary Ninja loader for 64 bits Apple SEPROMs
Binary Ninja loader for 64 bits Apple SEPROMs. Contribute to matteyeux/seprom-loader development by creating an account on GitHub.
Updates to XNU debugging tutorial https://www.hex-rays.com/blog/updates-to-xnu-debugging-tutorial/ #debugger #ida #ios #macos #dukeBarman
Ghidra framework for iOS kernelcache reverse engineering https://github.com/0x36/ghidra_kernelcache #reverse #ios #dukeBarman
GitHub
GitHub - 0x36/ghidra_kernelcache: a Ghidra framework for iOS kernelcache reverse engineering
a Ghidra framework for iOS kernelcache reverse engineering - 0x36/ghidra_kernelcache
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation https://github.com/ant4g0nist/Vulnerable-Kext #exploitation #ios #macos #dukeBarman
GitHub
GitHub - ant4g0nist/Vulnerable-Kext: A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation - ant4g0nist/Vulnerable-Kext
👍1
Fuzzing the Phone in the iPhone https://www.youtube.com/watch?v=1rcbQaVCCbQ #reverse #hardware #ios #dukeBarman
YouTube
Fuzzing the Phone in the iPhone
D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!
How secure is the interface between baseband chips and iOS?
While this interface should protect against escalations from the baseband into operating system components, its implementation is full of bugs. Fuzzing this…
How secure is the interface between baseband chips and iOS?
While this interface should protect against escalations from the baseband into operating system components, its implementation is full of bugs. Fuzzing this…
xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities https://github.com/tjkr0wn/xnu_gym #reverse #ios #exploitation #dukeBarman
GitHub
GitHub - tjkr0wn/xnu_gym: xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities.…
xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities. This is an easy way to practice kernel exploitation and jailbreak development! - tjkr0wn/xn...
Reverse Engineering iMessage: Leveraging the Hardware to Protect the Software https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software/ #reverse #mobile #ios #dukeBarman
Nowsecure
Reverse Engineering iMessage to Help Improve Security | NowSecure
Our researcher reverse engineered Apple iMessage to explore extending it the secure messaging app to other systems. See how he fared.
In-the-Wild Series: October 2020 0-day discovery
https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html
In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-wild. These exploits were delivered via "watering hole" attacks in a handful of websites pointing to two exploit servers that hosted exploit chains for Android, Windows, and iOS devices. These attacks appear to be the next iteration of the campaign discovered in February 2020 and documented in below blog posts:
Part1: Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html
Part2: Chrome Infinity Bug
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html
Part3: Chrome Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html
Part4: Android Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Part5: Android Post-Exploitation
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Part6: Windows Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html
#reverse #expdev #rce #lpe #sandbox #escape #android #ios #windows #chrome #browser #darw1n
https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html
In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-wild. These exploits were delivered via "watering hole" attacks in a handful of websites pointing to two exploit servers that hosted exploit chains for Android, Windows, and iOS devices. These attacks appear to be the next iteration of the campaign discovered in February 2020 and documented in below blog posts:
Part1: Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html
Part2: Chrome Infinity Bug
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html
Part3: Chrome Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html
Part4: Android Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Part5: Android Post-Exploitation
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Part6: Windows Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html
#reverse #expdev #rce #lpe #sandbox #escape #android #ios #windows #chrome #browser #darw1n
Blogspot
In-the-Wild Series: October 2020 0-day discovery
Posted by Maddie Stone, Project Zero In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-w...
Go-iOS was inspired by the wonderful libimobiledevice. It can do all of what libimobiledevice can do and more. Highlights:
- run XCTests including WebdriverAgent on Linux, Windows and Mac
- start and stop apps
- Use a debug proxy to reverse engineer every tool Mac OSX has, so you can contrib to go-ios or build your own
- use Accessibility Inspector APIs
https://github.com/danielpaulus/go-ios
#reverse #iOS #dukeBarman
- run XCTests including WebdriverAgent on Linux, Windows and Mac
- start and stop apps
- Use a debug proxy to reverse engineer every tool Mac OSX has, so you can contrib to go-ios or build your own
- use Accessibility Inspector APIs
https://github.com/danielpaulus/go-ios
#reverse #iOS #dukeBarman
GitHub
GitHub - danielpaulus/go-ios: This is an operating system independent implementation of iOS device features. You can run UI tests…
This is an operating system independent implementation of iOS device features. You can run UI tests, launch or kill apps, install apps etc. with it. - GitHub - danielpaulus/go-ios: This is an oper...
iOS Hacking videos by HackerOne:
- Application Basics https://www.youtube.com/watch?v=VQTQ0VaIXF0
- Filesystem Basics https://www.youtube.com/watch?v=voYFTRoH4CU
- Inter-App Communication https://www.youtube.com/watch?v=zld8VuihCCQ
#reverse #iOS #dukeBarman
- Application Basics https://www.youtube.com/watch?v=VQTQ0VaIXF0
- Filesystem Basics https://www.youtube.com/watch?v=voYFTRoH4CU
- Inter-App Communication https://www.youtube.com/watch?v=zld8VuihCCQ
#reverse #iOS #dukeBarman
YouTube
iOS Hacking - Application Basics
In the first video in our iOS application hacking series, we’ll look at the basics of the application package. You’ll learn how an IPA file is structured, the parts of the Mach-O binary format, and simple steps you can take to ascertain the application’s…
Experiment to attempt to build Apple's dyld tools. https://github.com/oleavr/dyld-tools #iOS #macOS #reverse #dukeBarman
GitHub
GitHub - oleavr/dyld-tools: Experiment to attempt to build Apple's dyld tools.
Experiment to attempt to build Apple's dyld tools. - oleavr/dyld-tools
iOS 14.5 WebKit/Safari based Jailbreak Made by RPwnage & the Manticore team
https://github.com/RPwnage/pwn-my
#reverse #expdev #ios #mobile #jailbreak #heckysome
https://github.com/RPwnage/pwn-my
#reverse #expdev #ios #mobile #jailbreak #heckysome
iOS Wi-Fi Demon: From iOS Format String to Zero-Click RCE
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
https://ictexpertsluxembourg.lu/technical-corner/ios-wi-fi-demon-from-ios-format-string-to-zero-click-rce/
#reverse #expdev #mobile #ios #rce #formatstring #darw1n
DEEP
DEEP – Votre partenaire pour une transformation digitale réussie
Avec son expertise en Cloud, Cybersécurité, Data et Télécom, DEEP aide les organisations à innover de manière responsable et à créer de la valeur à l’ère numérique.
iOS Tweak Development
Part1: https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2: https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3: https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4: https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
#dev #mobile #ios #tweak #darw1n
Part1: https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2: https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3: https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4: https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
#dev #mobile #ios #tweak #darw1n
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
https://github.com/majd/ipatool
#tweak #tool #mobile #ios #ipa #darw1n
https://github.com/majd/ipatool
#tweak #tool #mobile #ios #ipa #darw1n
GitHub
GitHub - majd/ipatool: Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App…
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store - majd/ipatool
Objective by the Sea v4.0 materials https://www.youtube.com/playlist?list=PLliknDIoYszvjA1Lix-Uce7ZDxS39J2ZY #video #conference #macos #ios #dukeBarman
YouTube
Objective by the Sea, v4.0
#OBTS v4, September 2021 Maui, HI Objective by the Sea (#OBTS) is the world's only Apple-centric security conference, which brings together the worlds top Ap...
👍1