An improved nm + Objective-C & Swift class-dump https://github.com/DerekSelander/dsdump #reverse #macos #ios #dukeBarman
GitHub
GitHub - DerekSelander/dsdump: An improved nm + Objective-C & Swift class-dump
An improved nm + Objective-C & Swift class-dump. Contribute to DerekSelander/dsdump development by creating an account on GitHub.
A collection of types & functions definitions useful for Objective-C binaries analysis (example in readme for #IDA) https://github.com/PoomSmart/IDAObjcTypes #reverse #macos #dukeBarman
GitHub
GitHub - PoomSmart/IDAObjcTypes: A collection of types & functions definitions useful for iOS/macOS binaries analysis.
A collection of types & functions definitions useful for iOS/macOS binaries analysis. - PoomSmart/IDAObjcTypes
A graphical Mach-O viewer for macOS. Powered by Mach-O Kit. https://github.com/DeVaukz/MachO-Explorer #reverse #macos #ios #dukeBarman
GitHub
GitHub - DeVaukz/MachO-Explorer: A graphical Mach-O viewer for macOS. Powered by Mach-O Kit.
A graphical Mach-O viewer for macOS. Powered by Mach-O Kit. - DeVaukz/MachO-Explorer
The 'S' in Zoom, Stands for Security uncovering (local) security flaws in Zoom's latest macOS client https://objective-see.com/blog/blog_0x56.html #exploit #macos #dukeBarman
objective-see.org
The 'S' in Zoom, Stands for Security
uncovering (local) security flaws in Zoom's latest macOS client
OSX.EvilQuest Uncovered analyzing a new piece of mac ransomware (and more!) https://objective-see.com/blog/blog_0x59.html #reverse #malware #macos #dukeBarman
objective-see.org
OSX.EvilQuest Uncovered
part i: infection, persistence, and more!
Similar implementation of .gdbinit from fG! for lldb in python https://github.com/deroko/lldbinit #reverse #debugger #macos #ios #dukeBarman
GitHub
GitHub - deroko/lldbinit
Contribute to deroko/lldbinit development by creating an account on GitHub.
โค1
Apple's Security Research Device Program was officially launched https://developer.apple.com/programs/security-research-device/ #ios #macos #dukeBarman
Security Research Device - Apple Security Research
Get an iPhone dedicated to security research through the Apple Security Research Device program. Learn how to apply.
Updates on ThiefQuest, the Quickly-Evolving macOS Malware https://blog.trendmicro.com/trendlabs-security-intelligence/updates-on-thiefquest-the-quickly-evolving-macos-malware/ #malware #reverse #macos #dukeBarman
Trend Micro
Updates on Quickly-Evolving ThiefQuest macOS Malware
We discuss our discoveries on ThiefQuest, such as the differences between the old and new versions of the malware, and why we believe ThiefQuest is an example of highly capable malware that should be kept under close monitoring.
The core of Apple is PPL (Apple's Page Protection Layer): Breaking the XNU kernel's kernel https://googleprojectzero.blogspot.com/2020/07/the-core-of-apple-is-ppl-breaking-xnu.html #exploitation #macos #ios #dukeBarman
Blogspot
The core of Apple is PPL: Breaking the XNU kernel's kernel
Posted by Brandon Azad, Project Zero While doing research for the one-byte exploit technique , I considered several ways it might be poss...
CVE-2020โ9854: "Unauthd" (three) logic bugs ftw! https://objective-see.com/blog/blog_0x4D.html #macos #exploit #dukeBarman
objective-see.org
CVE-2020โ9854: "Unauthd"
(three) logic bugs ftw!
Updates to XNU debugging tutorial https://www.hex-rays.com/blog/updates-to-xnu-debugging-tutorial/ #debugger #ida #ios #macos #dukeBarman
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation https://github.com/ant4g0nist/Vulnerable-Kext #exploitation #ios #macos #dukeBarman
GitHub
GitHub - ant4g0nist/Vulnerable-Kext: A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation - ant4g0nist/Vulnerable-Kext
๐1
This proof-of-concept demonstrates a trivial no-bug, by-design virtual machine guest-to-host escape with full arbitrary code execution on the current version of Parallels Desktop for Mac https://github.com/badd1e/Proof-of-Concept/tree/main/prl_not0day #exploitation #macOS #dukeBarman
GitHub
Proof-of-Concept/prl_not0day at main ยท alisaesage/Proof-of-Concept
Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionality or a handy trick. - alisaesage/Proof-of-Concept
Experiment to attempt to build Apple's dyld tools. https://github.com/oleavr/dyld-tools #iOS #macOS #reverse #dukeBarman
GitHub
GitHub - oleavr/dyld-tools: Experiment to attempt to build Apple's dyld tools.
Experiment to attempt to build Apple's dyld tools. - oleavr/dyld-tools
M1RACLES: An Apple M1 Vulnerability is a covert channel vulnerability in the Apple Silicon โM1โ chip ( it isn't real vuln ). https://m1racles.com/ #exploitation #macOS #hardware #fun
M1Racles
M1RACLES: An Apple M1 Vulnerability
M1RACLES (CVE-2021-30747) is a covert channel vulnerability in the Apple Silicon โM1โ chip.
Objective by the Sea v4.0 materials https://www.youtube.com/playlist?list=PLliknDIoYszvjA1Lix-Uce7ZDxS39J2ZY #video #conference #macos #ios #dukeBarman
YouTube
Objective by the Sea, v4.0
#OBTS v4, September 2021 Maui, HI Objective by the Sea (#OBTS) is the world's only Apple-centric security conference, which brings together the worlds top Ap...
๐1
The installation package for IDA Pro 9.0 Beta 2 available without password.
https://out5.hex-rays.com/beta90_6ba923/
Forum for discussion:
https://forum.reverse4you.org/t/ida-pro-9-0-beta/20459
Chat for discussion:
https://xn--r1a.website/r0_chat/1
#tools #reverse #idapro #windows #linux #macos
https://out5.hex-rays.com/beta90_6ba923/
Forum for discussion:
https://forum.reverse4you.org/t/ida-pro-9-0-beta/20459
Chat for discussion:
https://xn--r1a.website/r0_chat/1
#tools #reverse #idapro #windows #linux #macos
๐ฅ24๐8