<kbd id="afajh"><form id="afajh"></form></kbd>
<strong id="afajh"><dl id="afajh"></dl></strong>
    <del id="afajh"><form id="afajh"></form></del>
        1. <th id="afajh"><progress id="afajh"></progress></th>
          <b id="afajh"><abbr id="afajh"></abbr></b>
          <th id="afajh"><progress id="afajh"></progress></th>

          IosHackStudy安全學(xué)習(xí)資料匯總

          聯(lián)合創(chuàng)作 · 2023-09-26 13:07

          IOS安全學(xué)習(xí)資料匯總

          (1)IOS安全學(xué)習(xí)網(wǎng)站收集:

          http://samdmarshall.com
          https://www.exploit-db.com
          https://reverse.put.as
          http://highaltitudehacks.com/security/
          http://www.dllhook.com/
          http:// /www.securitylearn.net/archives/
          http://securitycompass.github.io/iPhoneLabs/index.html
          http://security.ios-wiki.com
          http://www.opensecuritytraining.info/IntroARM.html
          https: //truesecdev.wordpress.com/
          http://resources.infosecinstitute.com/ios-application-security-part-1-setting-up-a-mobile-pentesting-platform/
          http://esoftmobile.com/2014/ 02/14 / ios-security /
          http://bbs.iosre.com
          http://bbs.chinapyg.com
          http://blog.pangu.io/
          http://yonsm.net/
          http:// nianxi。凈/
          http://cocoahuke.com/
          https://blog.0xbbc.com
          http://blog.imaou.com/
          https://github.com/pandazheng/iOSAppReverseEngineering
          http://drops.wooyun.org
          http://bbs.pediy.com
          http: //www.blogfshare.com/
          https://github.com/michalmalik/osx-re-101
          http://blog.qwertyoruiop.com/
          https://github.com/secmobi/wiki.secmobi.com
          http: //contagioexchange.blogspot.com/
          http://contagiominidump.blogspot.com/
          https://github.com/secmobi
          https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Guide_Development_Project
          http:// blog.dornea.nu/2014/10/29/howto-ios-apps-static-analysis/
          http://www.dllhook.com/post/58.html
          http://thexploit.com/category/secdev/
          https://github.com/secmobi/wiki.secmobi.com
          https://github.com/mdsecresearch
          http://sectools.org/tag/os-x/
          http://googleprojectzero.blogspot.com/
          http: //googleprojectzero.blogspot.com/2014/10/more-mac-os-x-and-iphone-sandbox.html
          http://www.macexploit.com/
          https://code.google.com/p/google -security-research / issues / list?can = 1&q = iOS&sort = -id&colspec = ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary
          https://code.google.com/p/google-security-research/issues / list?can = 1&q = OSX&sort = -id&colspec = ID + Type + Status + Priority + Milestone + Owner + Summary&cells = tiles
          http://googleprojectzero.blogspot.com/2014/11/pwn4fun-spring-2014-safari-part -ii.html
          https://www.blackhat.com/docs/us-15/materials/us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf
          https://www.youtube.com/watch?v = rxUgw5bEG3Y
          https://www.theiphonewiki.com/wiki/固件
          http://www.trustedbsd.org/mac.html
          http://googleprojectzero.blogspot.com/2014/10/more-mac-os-x- and-iphone-sandbox.html
          https://code.google.com/p/google-security-research/issues/list?can=1&q=OSX&sort=-id&colspec=ID+Type+Status+Priority+Milestone+Owner+摘要&cells = tiles
          https://support.apple.com/zh-cn/HT205731
          https://www.apple.com/support/security/
          http://opensource.apple.com/tarballs/
          https:// mobile- security.zeef.com/oguzhan.topgu
          http://www.powerofcommunity.net
          http://cn.0day.today/exploits
          https://recon.cx/2016/training/trainingios-osx.html
          https://www.exploit-db.com/osx-rop-exploits-evocam-case-study/
          https://www.offensive-security .com / vulndev / evocam-remote-buffer-overflow-on-osx /
          https://www.yumpu.com/zh-CN/document/view/7010924/ios-kernel-heap-armageddon
          http://contagiodump.blogspot。 com /
          http://www.dllhook.com/post/138.html
          http://shell-storm.org/blog/Return-Oriented-Programming-and-ROPgadget-tool/
          https://medium.com/@ harryworld / 100-days-of-osx-development-e61591fcb8c8#.vxyuyse12
          http://www.poboke.com/study/reverse
          https://www.offensive-security.com/vulndev/evocam-remote-buffer-overflow -on-osx /
          https://www.exploit-db.com/osx-rop-exploits-evocam-case-study/
          http://phrack.org/issues/69/1.html
          https://www.exploit-db.com/docs/28479.pdf
          https://speakerdeck.com/milkmix/ios-malware-myth-or-reality
          https://bbs.pediy.com/thread-223117。 htm

          (2)IOS安全優(yōu)秀博客文章

          http://datatheorem.github.io/TrustKit/
          http://ho.ax/posts/2012/02/resolving-kernel-symbols/
          http://www.securitylearn.net/tag/pentesting-ios-apps/
          https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
          https://github.com/secmobi/wiki.secmobi。 com
          http://bbs.iosre.com/t/debugserver-lldb-gdb/65
          http://bbs.pediy.com/showthread.php?t=193859
          http://bbs.pediy.com/showthread.php ?t = 192657&viewgoodnees = 1&prefixid =
          http://blog.darkrainfall.org/2013/01/os-x-internals/
          http://dvlabs.tippingpoint.com/blog/2009/03/06/reverse-engineering-iphone -appstore-binaries
          http://drops.wooyun.org/papers/5309
          http://www.blogfshare.com/category/ios-secure
          https://www.safaribooksonline.com/library/view/hacking-and-securing/9781449325213/ch08s04.html
          http://soundly.me/osx-injection-override-tutorial-hello-world/
          https:// nadavrub .wordpress.com / 2015/07/23 / injecting-code-to-an-ios-appstore-app /
          http://blog.dewhurstsecurity.com/
          https://github.com/project-imas
          https:// github.com/iSECPartners
          https://www.nowsecure.com/blog/
          http://lightbulbone.com/
          http://www.tanhao.me/pieces/1515.html/
          http://dongaxis.github.io /
          https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/

          (3)IOS安全優(yōu)秀GitHub

          包含O'Reilly的iOS 9 Swift編程手冊(cè)的所有示例代碼
          https://github.com/vandadnp/iOS-9-Swift-Programming-Cookbook
          XCodeGhost清除腳本
          https://github.com/pandazheng/XCodeGhost-Clean
          Apple OS X ROOT提權(quán)API后門
          https://github.com/tihmstar/rootpipe_exploit
          適用于iOS和OS的輕松且通用的SSL固定X
          https://github.com/datatheorem/TrustKit
          使用shellcode
          https修補(bǔ)PE,ELF,Mach-O二進(jìn)制文件://github.com/secretsquirrel/the-backdoor-factory
          iReSign允許的iDevice的應(yīng)用程序包(的.ipa)文件,以便與蘋果的數(shù)字證書分發(fā)給簽署或辭職
          https://github.com/maciekish/iReSign
          馬赫-O加載命令反混淆器
          https://github.com/x43x61x69/Mach-O-Prettifier
          Dylib插入Mach-O文件
          https://github.com/Tyilo/insert_dylib
          dylib用于mach-o二進(jìn)制文件的注入器
          https://github.com/KJCracks/yololib
          快速的iOS可執(zhí)行轉(zhuǎn)儲(chǔ)程序
          https://github.com/KJCracks/Clutch
          Mac OS X的libimobiledevice庫的二進(jìn)制分發(fā)
          https://github.com/benvium/libimobiledevice-macosx
          與OS X上的dylib劫持有關(guān)的python實(shí)用程序
          https:// /github.com/synack/DylibHijack
          OSX dylib注入
          https://github.com/scen/osxinj
          IOS IPA軟件包精簡(jiǎn)并辭職
          https://github.com/Yonsm/iPAFine
          ROP漏洞利用
          https://github.com/JonathanSalwan / ROPgadget
          對(duì)任何Mach-o文件進(jìn)行類轉(zhuǎn)儲(chǔ)而不從dyld_shared_cache
          https://github.com/limneos/classdump-dyld中提取文件
          掃描IPA文件并解析其info.plist
          https://github.com/apperian/iOS-checkIPA
          A通過庫注入的PoC Mach-O感染器
          https://github.com/gdbinit/osx_boubou
          IOS-Headers
          https://github.com/MP0w/iOS-Headers
          Mac OS X的進(jìn)程間代碼注入
          https://github.com/ rentzsch / mach_inject
          OS X Auditor是免費(fèi)的Mac OS X計(jì)算機(jī)取證工具
          https://github.com/jipegit/OSXAuditor
          刪除osx的PIE
          https://github.com/CarinaTT/MyRemovePIE
          IDA https的TE可執(zhí)行格式加載器
          : //github.com/gdbinit/TELoader
          移動(dòng)安全框架
          https://github.com/ajinabraham/Mobile-Security-Framework-MobSF
          一個(gè)庫,可以動(dòng)態(tài)重新綁定運(yùn)行在iOS上的Mach-O二進(jìn)制文件中的符號(hào)
          https://github.com/facebook/fishhook
          OSX和iOS相關(guān)安全工具
          https://github.com/ashishb/osx-and-ios-security-awesome
          Introspy-Analyzer
          https://github.com/iSECPartners/Introspy-Analyzer
          將加密的iPhone應(yīng)用程序中解密的mach-o文件從內(nèi)存轉(zhuǎn)儲(chǔ)到內(nèi)存磁盤
          https://github.com/stefanesser/dumpdecrypted
          適用于iOS和OS X的Keychain的簡(jiǎn)單Swift包裝器
          https://github.com/kishikawakatsumi/KeychainAccess
          idb是一種工具,可簡(jiǎn)化iOS滲透測(cè)試和研究的一些常見任務(wù)

          使用Parse作為后端的https://github.com/dmayer/idb Pentesting應(yīng)用程序
          https://github.com/igrekde/ParseRevealer
          iOS逆向工程工具包
          https://github.com/Vhacker/iRET
          XNU-Mac OS X內(nèi)核
          https://github.com/opensource-apple/xnu
          OSX的代碼注入+有效負(fù)載通信
          https://github.com/mhenr18/injector
          iOS相關(guān)代碼
          https://github.com/samdmarshall/iOS-Internals
          OSX注入教程:Hello World
          https://github.com/arbinger/osxinj_tut
          Reveal加載程序?qū)ibReveal.dylib(Reveal.app支持)動(dòng)態(tài)加載到越獄設(shè)備上的iOS應(yīng)用程序中
          https://github.com/heardrwt/RevealLoader
          NSUserDefaults類別,帶有AES加密/解密密鑰和值
          https://github.com/NZN/NSUserDefaults-AESEncryptor
          黑 盒工具可禁用SSL證書驗(yàn)證
          https://github.com/iSECPartners/ios-ssl-kill-switch
          應(yīng)用逆向工程抽獎(jiǎng)插件
          https://github.com/iosre/iosrelottery
          未經(jīng)測(cè)試的iOS調(diào)整,以掛鉤OpenSSL函數(shù)
          https://github.com/nabla-c0d3/iOS-hook-OpenSSL
          IOS * .plist加密器項(xiàng)目。保護(hù)您的.plist文件免于越獄
          https://github.com/FelipeFMMobile/ios-plist-encryptor
          iOS ipa文件重新設(shè)計(jì)工具
          https://github.com/hayaq/recodesign
          掃描iPhone / iPad / iPod應(yīng)用程序中的PIE標(biāo)志
          https://github.com/stefanesser/.ipa-PIE-Scanner
          通過cve-2015-1140的xnu本地特權(quán)升級(jí)IOHIDSecurePromptClient injectStringGated堆溢出| poc || gtfo
          https://github.com/kpwn/vpwn
          MachOView
          https://github.com/gdbinit/MachOView
          與iOS設(shè)備通信的跨平臺(tái)協(xié)議庫
          https://github.com/libimobiledevice/libimobiledevice
          WireLurkerDetector
          https://github.com/pandazheng/WireLurker
          發(fā)行按照GPL牌
          https://github.com/p0sixspwn/p0sixspwn
          通過CVE-2015 XNU本地權(quán)限提升
          https://github.com/kpwn/tpwn
          一個(gè)簡(jiǎn)單的通用OSX / iOS上的內(nèi)存編輯器(游戲培訓(xùn)師)
          https://github.com/pandazheng/HippocampHairSalon
          BinaryCookieReader源碼
          https://github.com/pandazheng/BinaryCookieReader
          Tiamo的引導(dǎo)程序
          https://github.com/pandazheng/macosxbootloader
          不完整的iOS 8.4.1越獄,由Kim Jong Cracks
          https://github.com/pandazheng/yalu
          OSX安全掃描程序
          https http://github.com/openscanner/XGuardian
          示例內(nèi)核擴(kuò)展,演示如何從kextstat隱藏
          https://github.com/rc0r/KextHider
          示例Mac OS X內(nèi)核擴(kuò)展,用于解析運(yùn)行中的內(nèi)核映像中的符號(hào)
          https:// github .com / snare / KernelResolver
          示例Mac OS X(Mountain Lion)內(nèi)核擴(kuò)展,演示了如何通過劫持getdirentries
          系統(tǒng)調(diào)用來隱藏文件
          https://github.com/rc0r/FileHider
          示例Mac OS X(Mountain Lion)內(nèi)核擴(kuò)展,演示了如何通過修改allproc和pidhashtbl隱藏進(jìn)程的方法
          https://github.com/rc0r/ProcessHider
          Mach-O反匯編程序。現(xiàn)在兼容64位和Xcode 6
          https://github.com/x43x61x69/otx
          一個(gè)Mach-O二進(jìn)制代碼簽名去除器
          https://github.com/x43x61x69/codeunsign
          一個(gè)Mach-O加載命令deobfuscator
          https://github.com/ x43x61x69 /馬赫-O-Prettifier
          很簡(jiǎn)單的鍵盤記錄器為自量化在Mac OS X
          https://github.com/dannvix/keylogger-osx
          通過iTunes LIB管理iOS設(shè)備
          https://github.com/xslim/mobileDeviceManager
          檢測(cè)硬件,軟件以及運(yùn)行時(shí)當(dāng)前iOS或Mac OS X設(shè)備的顯示
          https://github.com/lmirosevic/GBDeviceInfo
          逆向工程Python武器庫
          http://pythonarsenal.com/
          OS X加密勒索軟件PoC
          https://github.com/gdbinit/gopher
          Frida
          https://codeshare.frida。 re /
          原始碼級(jí)偵錯(cuò)的XNU核心 https://bbs.ichunqiu.com/thread-48301-1-1.html
          裝甲:功能強(qiáng)大的macOS有效負(fù)載加密工具,可繞過大部分AV
          https:// www .freebuf.com / sectool / 190620.html
          使用radare2逆向iOS Swift應(yīng)用程序
          https://www.freebuf.com/articles/terminal/191595.html
          調(diào)試macOS內(nèi)核很有趣
          https://geosn0w.github.io/Debugging -macOS-Kernel-For-Fun /
          MacMalware_2018
          https://objective-see.com/downloads/MacMalware_2018.pdf
          適用于iOS的OpenSource.Apple.Com的精華
          http://newosxbook.com/tools/iOSBinaries.html
          FortiAppMonitor:用于監(jiān)控macOS上的系統(tǒng)活動(dòng)的強(qiáng)大工具
          https://www.freebuf.com/sectool/193258.html

          樣品

          https://objective-see.com/malware.html#resources

          (4)IOS安全優(yōu)秀書籍

          《破解和保護(hù)iOS應(yīng)用程序》
          《 Mac OS X和iOS內(nèi)部構(gòu)件:以蘋果的核心》
          《 OS X和iOS內(nèi)核編程》
          《 OS X ABI Mach-O文件格式》
          《 Mac黑客手冊(cè)》
          《 Mac OS X Interals:一種系統(tǒng)方法》
          《黑客攻防技術(shù)寶典-IOS實(shí)戰(zhàn)》
          《 IOS應(yīng)用安全攻防實(shí)戰(zhàn)》
          《 IOS應(yīng)用逆向工程》
          《 IOS取證戰(zhàn)》
          《安全技術(shù)大系:IOS取證分析》

          (5)IOS安全推特

          https://twitter.com/Technologeeks
          https://twitter.com/osxreverser
          https://twitter.com/Morpheus ______

          (6)OSX / IOS漏洞分析文章

          CVE-2016-1749
          http://turingh.github.io/2016/04/29/CVE-2016-1749%E5%86%85%E6%A0%B8%E4%BB%A3%E7%A0%81 %E6%89%A7%E8%A1%8CPOC%E5%88%86%E6%9E%90 /

          CVE-2016-1757
          http://googleprojectzero.blogspot.com/2016/03/race-you-to-kernel.html
          https://github.com/gdbinit/mach_race

          CVE-2016-1824
          http://marcograss.github.io/security/apple/cve/2016/05/16/cve-2016-1824-apple-iohidfamily-racecondition.html

          IOS越獄中使用到的突破列表

          ### ipsw ios10 ipsw
          https://ipsw.me/所有
          https://www.alliphone.com
          https://www.theiphonewiki.com/wiki/Firmware_Keys
          http://pastebin.com/FRMfanmT https:// www.reddit.com/r/jailbreak/comments/4nyz1p/discussion_decrypted_kernel_cache_ios_10/d48cgd7 https://www.nowsecure.com/blog/2014/04/14/ios-kernel-reversing-step-by-step/
          http:// /www.iphonehacks.com/download-iphone-ios-firmware


          Mac下的一些軟件

          http://sqwarq.com/detectx/

          Mac下的安全軟件

          https://objective-see.com/products.html

          瀏覽 42
          點(diǎn)贊
          評(píng)論
          收藏
          分享

          手機(jī)掃一掃分享

          編輯 分享
          舉報(bào)
          評(píng)論
          圖片
          表情
          推薦
          點(diǎn)贊
          評(píng)論
          收藏
          分享

          手機(jī)掃一掃分享

          編輯 分享
          舉報(bào)
          <kbd id="afajh"><form id="afajh"></form></kbd>
          <strong id="afajh"><dl id="afajh"></dl></strong>
            <del id="afajh"><form id="afajh"></form></del>
                1. <th id="afajh"><progress id="afajh"></progress></th>
                  <b id="afajh"><abbr id="afajh"></abbr></b>
                  <th id="afajh"><progress id="afajh"></progress></th>
                  男女怕怕网站 | jizzjizz丝袜老师 | 欧美色图日韩精品在线一区 | 国产高清a√ | 黄色一级大片在线免费看国产 |