Starred repositories
A map showing the carriers used by Easybell for their VDSL products
Decompiling macOS Hypervisor.framework by hand
Component to perform network speed tests against Cloudflare's edge network
Open source implementation of Apple's SwiftUI.
kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices.
A Quality of Experience and Smart Queue Management system for ISPs. Leverage CAKE to improve network responsiveness, enforce bandwidth plans, and reduce bufferbloat.
This repository discloses a critical vulnerability in Apple’s A16 Bionic chip, where debug logic is executed on production-fused devices (dev-fused=0, debug=0x0). Logs show SecureROM and co-process…
The Secure Enclave and digitizer controller share I2C4. Electrical faults on this bus halt SPU init and break input. A silicon-level flaw with no redundancy or recovery.
This repo documents a vulnerability in Siri Shortcuts and Shared Web Credentials (SWC) allowing malformed payloads to persistently execute, trigger retry storms, bypass TLS validation, and request …
Discovery of a critical Bluetooth and GPS privacy vulnerability in iOS 18.5 enabling silent BLE scans, covert GPS activation, and trust metadata exposure without user consent. Native Apple daemons …
Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, exploiting WebKit (CVE-2025-24201) and Core Media (CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking.…
CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalati…
ELEGANTBOUNCER is a detection tool for file-based mobile exploits.
CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.
Apple Continuity Protocol Reverse Engineering and Dissector
Deterministic kernel exploit based on CVE-2023-32434.
A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley
(Unofficial) Apple Developer System Status Feeds: Mastodon, Bluesky, RSS
This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges
Escape macOS Sandbox using sharedfilelistd exploit
Cross-compat library for parsing Apple Archive + Apple Encrypted Archive (.aar/.yaa/.aea).
libAppleArchive exploit maker, read the writeup here https://snoolie.gay/blog/CVE-2024-27876