iOS安全相关学习资料
- https://github.com/zhengmin1989/iOS_ICE_AND_FIRE (冰与火代码)
- http://weibo.com/zhengmin1989?is_hot=1 (蒸米博客)
- http://drops.wooyun.org/tips/9300
- http://drops.wooyun.org/papers/10156
- https://github.com/KJCracks/yololib (dylib注入源码)
- https://github.com/zhengmin1989/iOS_ICE_AND_FIRE (binary)
- CaptainHook framework
OSX/IOS漏洞源码:php
- https://github.com/tihmstar/rootpipe_exploit
- https://github.com/jndok/ropnroll
- https://github.com/tyranid/canape-ssl-mitm-osx
- https://github.com/kpwn/vpwn
- https://github.com/kpwn/tpwn
- https://github.com/jndok/tpwn-bis
- https://github.com/wzw19890321/OSX_vul
- https://github.com/linusyang/SSLPatch
公开的IOS越狱源码:html
- IOS6.1.3~6.1.6的越狱源码
- https://github.com/p0sixspwn/p0sixspwn
- IOS8.4.1的越狱源码
- https://github.com/kpwn/yalu
OSX/IOS漏洞研究博客:ios
- Hidden backdoor API to root privileges in Apple OS X
- https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
- Metasploit post exploitation scripts to steal ios5 backups
- http://www.securitylearn.net/2012/09/09/metasploit-post-exploitation-scripts-to-steal-ios-5-backups/
- OS X 10.10 DYLD_PRINT_TO_FILE Local Privilege Escalation Vulnerability
- https://www.sektioneins.de/en/blog/15-07-07-dyld_print_to_file_lpe.html
- Researchers discover new keychain vulnerability in osx
- http://www.csoonline.com/article/2979068/vulnerabilities/researchers-discover-new-keychain-vulnerability-in-osx.html
- Drop-dead simple exploit completely bypasses Mac’s malware Gatekeeper
- http://arstechnica.com/security/2015/09/drop-dead-simple-exploit-completely-bypasses-macs-malware-gatekeeper/
- IOS9.2/9.2.1修补的内核漏洞
- http://blog.pangu.io/race_condition_bug_92/
- POC2015 & RUXCON2015 盘古团队议题
- http://blog.pangu.io/poc2015-ruxcon2015/
- 一个“短命”的IOS内核漏洞
- http://blog.pangu.io/short-lifecycle-bug/
- IOS8.4.1 Kernel Vulnerabilities in AppleHDQGasGaugeControl
- http://blog.pangu.io/ios-8-4-1-kernel-vulns/
- CVE-2015-5774
- http://blog.pangu.io/cve-2015-5774/
- IOS8.1.2越狱过程详解及相关漏洞分析
- http://nirvan.360.cn/blog/?p=887
- 从p0sixspwn源码看越狱流程,原理,目的
- http://bbs.pediy.com/showthread.php?t=193859&viewgoodnees=1&prefixid=
- Pangu8越狱中所用/usr/libexec/neagent漏洞原理分析
- http://bbs.pediy.com/showthread.php?t=195495&viewgoodnees=1&prefixid=
- DYLD_ROOT_PATH dyld本地提取漏洞分析
- http://nirvan.360.cn/blog/?p=455
- tpwn分析
- http://nirvan.360.cn/blog/?p=469
- CVE-2015-5774分析及利用
- http://nirvan.360.cn/blog/?p=461
- CVE-2014-4423分析过程及结论
- http://nirvan.360.cn/blog/?p=450
- IOS ODay分析:播放视频形成内核DoS
- http://nirvan.360.cn/blog/?p=487
- IOS进程通信安全和利用
- http://nirvan.360.cn/blog/?p=723
- 在非越狱的iPhone6(IOS8.1.3)上进行钓鱼攻击(盗取App Store密码)
- http://drops.wooyun.org/mobile/4998
- IOS URL Scheme劫持-在未越狱的iPhone6上盗取支付宝和微信支付的账号和密码
- http://drops.wooyun.org/papers/5309
- IOS冰与火之歌-Object-C Pwn and IOS arm64 ROP
- http://drops.wooyun.org/papers/12355
- IOS冰与火之歌-在非越狱手机上进行App Hook
- http://drops.wooyun.org/papers/12803
- 对dyld的分析(源码,代码签名等)
- http://cocoahuke.com/2016/02/14/dyld%E5%8A%A0%E8%BD%BD%E8%BF%87%E7%A8%8B/
- 太极taiji(IOS8.4)Info和部分反编译代码
- http://cocoahuke.com/2015/09/18/taij(iOS8.4)/
- CVE-2015-5774
- http://cocoahuke.com/2015/09/18/describeCVE-2015-5774/
OSX/IOS漏洞集合网站:git
- https://www.exploit-db.com/platform/?p=osx
- https://www.exploit-db.com/platform/?p=ios
- https://www.cvedetails.com/vulnerability-list/vendor_id-49/product_id-15556/Apple-Iphone-Os.html
- http://www.macexploit.com/
欢迎关注本站公众号,获取更多信息