Stars
- All languages
- ActionScript
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Clojure
- D
- F*
- Go
- HTML
- Hack
- Java
- JavaScript
- Julia
- Jupyter Notebook
- Kotlin
- LLVM
- Makefile
- Mathematica
- OCaml
- Objective-C
- Objective-C++
- OpenEdge ABL
- PHP
- Perl
- Python
- Rich Text Format
- Ruby
- Rust
- SCSS
- Sage
- Scala
- Shell
- TeX
- Vim Script
- Visual Basic
- YARA
Recover compile-units from stripped binary executables
Recent symbolic execution papers and tools.
Secure/anonymous IRC-like chat using TOR hidden services
Alfred Workflow to find various Apple Device names and identifiers
PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)
搜集、整理、维护 Surge / Quantumult (X) / Shadowrocket / Surfboard / clash (Premium) 实用规则。
Implementation of https://eprint.iacr.org/2021/232
a Ghidra framework for iOS kernelcache reverse engineering
A greeklish wordlist containing various permutations
Proof-of-concept C implementation of AES with masking technique to prevent side-channel analysis attacks
Binary View plugin for reverse engineering iBoot like binaries with Binary Ninja
ARM Assembly Reference Manual for iOS, iPadOS, and macOS.
IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes
argp / ipwndfu
Forked from axi0mX/ipwndfuopen-source jailbreaking tool for many iOS devices
IDAPython loader to help with AArch64 iBoot, iBEC, and SecureROM reverse engineering