Stars
CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled
Presentation Archives for my macOS and iOS Related Research
Source code and binaries of FlexiSpy from the Flexidie dump
An explanation on unredacting iOS's <private> os_log privacy mechanism
Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
a lightweight, multi-platform, multi-architecture hook framework.
iblessing is an iOS security exploiting toolkit, it mainly includes application information gathering, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis …
CVE-2022-46718: an app may be able to read sensitive location information.
Detects the hardware, software and display of the current iOS or Mac OS X device at runtime.
A collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Bash script to extract data from a "chekcra1ned" iOS device
Digital forensics on a complete OS data-image captured from an Apple iPhone. The collected evidence showed criminal conspiracy with intent to steal valuable artifacts from the National Gallery of Art.
A curated list of iOS Forensics References, organized by folder with specific references (links to blog post, research paper, articles, and so on) for each interesting file
yet another tweak injector / tweak hooking library for darwin systems
APT & CyberCriminal Campaign Collection
📶 List networks on device and share them using QRs
Transform any ARM macho executable to a dynamic library
script to decrypt iOS keychain
Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.