- New York, NY
Stars
an iOS kernel function hooking framework for checkra1n'able devices
Indicators of Compromise from Amnesty International's cyber investigations
Index and collection of MVT compatibile indicators of compromise.
Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM
Emulating Apple Silicon devices.
Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even if they have been renamed as part of obfuscation. It compar…
Ghidra Extension to integrate BinDiff for function matching
A tree-sitter based AST difftool to get meaningful semantic diffs
GeoPort: Your Location, Anywhere! The iOS location simulator
Run iOS apps without actually installing them!
An on-device debugger/JIT enabler for iOS versions 17.4+, powered by idevice.
Reverse engineered headers for Apples CoreSymbolication private framework; plus the set of test cases I used to validate it
Code lifting for executing a visionOS library os macOS using QBDL and QBDI
A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode
DeviceFarmer / stf
Forked from openstf/stfControl and manage Android devices from your browser.
Reversing the Apple sandbox
Transmogrify native iOS frameworks to run in iOS Simulator on Apple silicon.
🔒 Swift Obfuscator that protects iOS apps against reverse engineering attacks.
A tool to detect root on android
a PoC that maybe an exploit that can read and export all system file from iOS 16.0 to 18.2 beta 1. Got patched on iOS 18.2 beta 2