rodnt's Stars
SnaffCon/Snaffler
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )
hfiref0x/KDU
Kernel Driver Utility
cytopia/pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Ch0pin/medusa
Binary instrumentation framework based on FRIDA
trickest/wordlists
Real-world infosec wordlists, updated regularly
worawit/blutter
Flutter Mobile Application Reverse Engineering Tool
assetnote/nowafpls
Burp Plugin to Bypass WAFs through the insertion of Junk Data
noraj/haiti
:key: Hash type identifier (CLI & lib)
houjingyi233/macOS-iOS-system-security
Here is some resources about macOS/iOS system security.
godaddy/tartufo
Searches through git repositories for high entropy strings and secrets, digging deep into commit history
zhengmin1989/GreatiOSJailbreakMaterial
Great iOS Jailbreak Material! - I read hundreds of papers and PPTs. Only list the most useful materials here!
PoomSmart/IDAObjcTypes
A collection of types & functions definitions useful for iOS/macOS binaries analysis.
matro7sh/myph
shellcode loader for your evasion needs
nheiniger/SnaffPoint
A tool for pointesters to find candies in SharePoint
mahaloz/decompilation-wiki
The Decompilation Wiki: info on all things decompilation
R00tkitSMM/CVE-2024-27804
POC for CVE-2024-27804
Karmaz95/Snake_Apple
Articles and tools related to research in the Apple environment (mainly macOS).
safebuffer/CVE-2024-32002
CVE-2024-32002 RCE PoC
ChiChou/novacane
Some frida scripts
aixcc-public/challenge-001-exemplar
Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please refer to resources inside of the competition environment)
0x3c3e/slides
CodeQL + DTrace = Memory Disclosure Vulnerabilities in XNU
mathetake/alvm
Run Linux ELF binary directly on macOS via hypervisor.framework
0x3c3e/pocs
My collection of PoCs
gergelykalman/CVE-2023-32364-macos-app-sandbox-escape
Exploit for CVE-2023-32364
trufae/blutter-docker
Docker container to use blutter (dart decompiler for android apps)
gergelykalman/CVE-2023-38571-a-macOS-TCC-bypass-in-Music-and-TV
Exploit for CVE-2023-38571
gergelykalman/CVE-2023-32407-a-macOS-TCC-bypass-in-Metal
vlauciani/guide-to-enable-ssh-on-macosx-recovery-mode
Guide to enable ssh on macOSX Recovery Mode
gergelykalman/CVE-2023-32422-a-macOS-TCC-bypass-in-sqlite
cedowens/LOOBins
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes.