RM新时代网站-首页

電子發(fā)燒友App

硬聲App

0
  • 聊天消息
  • 系統(tǒng)消息
  • 評(píng)論與回復(fù)
登錄后你可以
  • 下載海量資料
  • 學(xué)習(xí)在線課程
  • 觀看技術(shù)視頻
  • 寫(xiě)文章/發(fā)帖/加入社區(qū)
會(huì)員中心
創(chuàng)作中心

完善資料讓更多小伙伴認(rèn)識(shí)你,還能領(lǐng)取20積分哦,立即完善>

3天內(nèi)不再提示
創(chuàng)作
電子發(fā)燒友網(wǎng)>電子資料下載>電子資料>IosHackStudy安全學(xué)習(xí)資料匯總

IosHackStudy安全學(xué)習(xí)資料匯總

2022-04-19 | zip | 0.12 MB | 次下載 | 2積分

資料介紹

授權(quán)協(xié)議 未知
開(kāi)發(fā)語(yǔ)言 Swift
操作系統(tǒng) 跨平臺(tái)
軟件類型 開(kāi)源軟件

軟件簡(jiǎn)介

IOS安全學(xué)習(xí)資料匯總

(1)IOS安全學(xué)習(xí)網(wǎng)站收集:

http://samdmarshall.com
https://www.exploit-db.com
https://reverse.put.as
http://highaltitudehacks.com/security/
http://www.dllhook.com/
http:// /www.securitylearn.net/archives/
http://securitycompass.github.io/iPhoneLabs/index.html
http://security.ios-wiki.com
http://www.opensecuritytraining.info/IntroARM.html
https: //truesecdev.wordpress.com/
http://resources.infosecinstitute.com/ios-application-security-part-1-setting-up-a-mobile-pentesting-platform/
http://esoftmobile.com/2014/?02/14?/ ios-security /
http://bbs.iosre.com
http://bbs.chinapyg.com
http://blog.pangu.io/
http://yonsm.net/
http:// nianxi。凈/
http://cocoahuke.com/
https://blog.0xbbc.com
http://blog.imaou.com/
https://github.com/pandazheng/iOSAppReverseEngineering
http://drops.wooyun.org
http://bbs.pediy.com
http: //www.blogfshare.com/
https://github.com/michalmalik/osx-re-101
http://blog.qwertyoruiop.com/
https://github.com/secmobi/wiki.secmobi.com
http: //contagioexchange.blogspot.com/
http://contagiominidump.blogspot.com/
https://github.com/secmobi
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Guide_Development_Project
http:// blog.dornea.nu/2014/10/29/howto-ios-apps-static-analysis/
http://www.dllhook.com/post/58.html
http://thexploit.com/category/secdev/
https://github.com/secmobi/wiki.secmobi.com
https://github.com/mdsecresearch
http://sectools.org/tag/os-x/
http://googleprojectzero.blogspot.com/
http: //googleprojectzero.blogspot.com/2014/10/more-mac-os-x-and-iphone-sandbox.html
http://www.macexploit.com/
https://code.google.com/p/google -security-research / issues / list?can = 1&q = iOS&sort = -id&colspec = ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary
https://code.google.com/p/google-security-research/issues / list?can = 1&q = OSX&sort = -id&colspec = ID + Type + Status + Priority + Milestone + Owner + Summary&cells = tiles
http://googleprojectzero.blogspot.com/2014/11/pwn4fun-spring-2014-safari-part -ii.html
https://www.blackhat.com/docs/us-15/materials/us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf
https://www.youtube.com/watch?v = rxUgw5bEG3Y
https://www.theiphonewiki.com/wiki/固件
http://www.trustedbsd.org/mac.html
http://googleprojectzero.blogspot.com/2014/10/more-mac-os-x- and-iphone-sandbox.html
https://code.google.com/p/google-security-research/issues/list?can=1&q=OSX&sort=-id&colspec=ID+Type+Status+Priority+Milestone+Owner+摘要&cells = tiles
https://support.apple.com/zh-cn/HT205731
https://www.apple.com/support/security/
http://opensource.apple.com/tarballs/
https:// mobile- security.zeef.com/oguzhan.topgu
http://www.powerofcommunity.net
http://cn.0day.today/exploits
https://recon.cx/2016/training/trainingios-osx.html
https://www.exploit-db.com/osx-rop-exploits-evocam-case-study/
https://www.offensive-security .com / vulndev / evocam-remote-buffer-overflow-on-osx /
https://www.yumpu.com/zh-CN/document/view/7010924/ios-kernel-heap-armageddon
http://contagiodump.blogspot。 com /
http://www.dllhook.com/post/138.html
http://shell-storm.org/blog/Return-Oriented-Programming-and-ROPgadget-tool/
https://medium.com/@ harryworld / 100-days-of-osx-development-e61591fcb8c8#.vxyuyse12
http://www.poboke.com/study/reverse
https://www.offensive-security.com/vulndev/evocam-remote-buffer-overflow -on-osx /
https://www.exploit-db.com/osx-rop-exploits-evocam-case-study/
http://phrack.org/issues/69/1.html
https://www.exploit-db.com/docs/28479.pdf
https://speakerdeck.com/milkmix/ios-malware-myth-or-reality
https://bbs.pediy.com/thread-223117。 htm

(2)IOS安全優(yōu)秀博客文章

http://datatheorem.github.io/TrustKit/
http://ho.ax/posts/2012/02/resolving-kernel-symbols/
http://www.securitylearn.net/tag/pentesting-ios-apps/
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
https://github.com/secmobi/wiki.secmobi。 com
http://bbs.iosre.com/t/debugserver-lldb-gdb/65
http://bbs.pediy.com/showthread.php?t=193859
http://bbs.pediy.com/showthread.php ?t = 192657&viewgoodnees = 1&prefixid =
http://blog.darkrainfall.org/2013/01/os-x-internals/
http://dvlabs.tippingpoint.com/blog/2009/03/06/reverse-engineering-iphone -appstore-binaries
http://drops.wooyun.org/papers/5309
http://www.blogfshare.com/category/ios-secure
https://www.safaribooksonline.com/library/view/hacking-and-securing/9781449325213/ch08s04.html
http://soundly.me/osx-injection-override-tutorial-hello-world/
https:// nadavrub .wordpress.com / 2015/07/23 / injecting-code-to-an-ios-appstore-app /
http://blog.dewhurstsecurity.com/
https://github.com/project-imas
https:// github.com/iSECPartners
https://www.nowsecure.com/blog/
http://lightbulbone.com/
http://www.tanhao.me/pieces/1515.html/
http://dongaxis.github.io /
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/

(3)IOS安全優(yōu)秀GitHub

包含O'Reilly的iOS 9 Swift編程手冊(cè)的所有示例代碼
https://github.com/vandadnp/iOS-9-Swift-Programming-Cookbook
XCodeGhost清除腳本
https://github.com/pandazheng/XCodeGhost-Clean
Apple OS X ROOT提權(quán)API后門(mén)
https://github.com/tihmstar/rootpipe_exploit
適用于iOS和OS的輕松且通用的SSL固定X
https://github.com/datatheorem/TrustKit
使用shellcode
https修補(bǔ)PE,ELF,Mach-O二進(jìn)制文件://github.com/secretsquirrel/the-backdoor-factory
iReSign允許的iDevice的應(yīng)用程序包(的.ipa)文件,以便與蘋(píng)果的數(shù)字證書(shū)分發(fā)給簽署或辭職
https://github.com/maciekish/iReSign
馬赫-O加載命令反混淆器
https://github.com/x43x61x69/Mach-O-Prettifier
Dylib插入Mach-O文件
https://github.com/Tyilo/insert_dylib
dylib用于mach-o二進(jìn)制文件的注入器
https://github.com/KJCracks/yololib
快速的iOS可執(zhí)行轉(zhuǎn)儲(chǔ)程序
https://github.com/KJCracks/Clutch
Mac OS X的libimobiledevice庫(kù)的二進(jìn)制分發(fā)
https://github.com/benvium/libimobiledevice-macosx
與OS X上的dylib劫持有關(guān)的python實(shí)用程序
https:// /github.com/synack/DylibHijack
OSX dylib注入
https://github.com/scen/osxinj
IOS IPA軟件包精簡(jiǎn)并辭職
https://github.com/Yonsm/iPAFine
ROP漏洞利用
https://github.com/JonathanSalwan / ROPgadget
對(duì)任何Mach-o文件進(jìn)行類轉(zhuǎn)儲(chǔ)而不從dyld_shared_cache
https://github.com/limneos/classdump-dyld中提取文件
掃描IPA文件并解析其info.plist
https://github.com/apperian/iOS-checkIPA
A通過(guò)庫(kù)注入的PoC Mach-O感染器
https://github.com/gdbinit/osx_boubou
IOS-Headers
https://github.com/MP0w/iOS-Headers
Mac OS X的進(jìn)程間代碼注入
https://github.com/ rentzsch / mach_inject
OS X Auditor是免費(fèi)的Mac OS X計(jì)算機(jī)取證工具
https://github.com/jipegit/OSXAuditor
刪除osx的PIE
https://github.com/CarinaTT/MyRemovePIE
IDA?https的TE可執(zhí)行格式加載器
: //github.com/gdbinit/TELoader
移動(dòng)安全框架
https://github.com/ajinabraham/Mobile-Security-Framework-MobSF
一個(gè)庫(kù),可以動(dòng)態(tài)重新綁定運(yùn)行在iOS上的Mach-O二進(jìn)制文件中的符號(hào)
https://github.com/facebook/fishhook
OSX和iOS相關(guān)安全工具
https://github.com/ashishb/osx-and-ios-security-awesome
Introspy-Analyzer
https://github.com/iSECPartners/Introspy-Analyzer
將加密的iPhone應(yīng)用程序中解密的mach-o文件從內(nèi)存轉(zhuǎn)儲(chǔ)到內(nèi)存磁盤(pán)
https://github.com/stefanesser/dumpdecrypted
適用于iOS和OS X的Keychain的簡(jiǎn)單Swift包裝器
https://github.com/kishikawakatsumi/KeychainAccess
idb是一種工具,可簡(jiǎn)化iOS滲透測(cè)試和研究的一些常見(jiàn)任務(wù)

使用Parse作為后端的https://github.com/dmayer/idb?Pentesting應(yīng)用程序
https://github.com/igrekde/ParseRevealer
iOS逆向工程工具包
https://github.com/Vhacker/iRET
XNU-Mac OS X內(nèi)核
https://github.com/opensource-apple/xnu
OSX的代碼注入+有效負(fù)載通信
https://github.com/mhenr18/injector
iOS相關(guān)代碼
https://github.com/samdmarshall/iOS-Internals
OSX注入教程:Hello World
https://github.com/arbinger/osxinj_tut
Reveal加載程序?qū)ibReveal.dylib(Reveal.app支持)動(dòng)態(tài)加載到越獄設(shè)備上的iOS應(yīng)用程序中
https://github.com/heardrwt/RevealLoader
NSUserDefaults類別,帶有AES加密/解密密鑰和值
https://github.com/NZN/NSUserDefaults-AESEncryptor
黑?盒工具可禁用SSL證書(shū)驗(yàn)證
https://github.com/iSECPartners/ios-ssl-kill-switch
應(yīng)用逆向工程抽獎(jiǎng)插件
https://github.com/iosre/iosrelottery
未經(jīng)測(cè)試的iOS調(diào)整,以掛鉤OpenSSL函數(shù)
https://github.com/nabla-c0d3/iOS-hook-OpenSSL
IOS * .plist加密器項(xiàng)目。保護(hù)您的.plist文件免于越獄
https://github.com/FelipeFMMobile/ios-plist-encryptor
iOS ipa文件重新設(shè)計(jì)工具
https://github.com/hayaq/recodesign
掃描iPhone / iPad / iPod應(yīng)用程序中的PIE標(biāo)志
https://github.com/stefanesser/.ipa-PIE-Scanner
通過(guò)cve-2015-1140的xnu本地特權(quán)升級(jí)IOHIDSecurePromptClient injectStringGated堆溢出|?poc || gtfo
https://github.com/kpwn/vpwn
MachOView
https://github.com/gdbinit/MachOView
與iOS設(shè)備通信的跨平臺(tái)協(xié)議庫(kù)
https://github.com/libimobiledevice/libimobiledevice
WireLurkerDetector
https://github.com/pandazheng/WireLurker
發(fā)行按照GPL牌
https://github.com/p0sixspwn/p0sixspwn
通過(guò)CVE-2015 XNU本地權(quán)限提升
https://github.com/kpwn/tpwn
一個(gè)簡(jiǎn)單的通用OSX / iOS上的內(nèi)存編輯器(游戲培訓(xùn)師)
https://github.com/pandazheng/HippocampHairSalon
BinaryCookieReader源碼
https://github.com/pandazheng/BinaryCookieReader
Tiamo的引導(dǎo)程序
https://github.com/pandazheng/macosxbootloader
不完整的iOS 8.4.1越獄,由Kim Jong Cracks
https://github.com/pandazheng/yalu
OSX安全掃描程序
https http://github.com/openscanner/XGuardian
示例內(nèi)核擴(kuò)展,演示如何從kextstat隱藏
https://github.com/rc0r/KextHider
示例Mac OS X內(nèi)核擴(kuò)展,用于解析運(yùn)行中的內(nèi)核映像中的符號(hào)
https:// github .com / snare / KernelResolver
示例Mac OS X(Mountain Lion)內(nèi)核擴(kuò)展,演示了如何通過(guò)劫持getdirentries
系統(tǒng)調(diào)用來(lái)隱藏文件
https://github.com/rc0r/FileHider
示例Mac OS X(Mountain Lion)內(nèi)核擴(kuò)展,演示了如何通過(guò)修改allproc和pidhashtbl隱藏進(jìn)程的方法
https://github.com/rc0r/ProcessHider
Mach-O反匯編程序?,F(xiàn)在兼容64位和Xcode 6
https://github.com/x43x61x69/otx
一個(gè)Mach-O二進(jìn)制代碼簽名去除器
https://github.com/x43x61x69/codeunsign
一個(gè)Mach-O加載命令deobfuscator
https://github.com/ x43x61x69 /馬赫-O-Prettifier
很簡(jiǎn)單的鍵盤(pán)記錄器為自量化在Mac OS X
https://github.com/dannvix/keylogger-osx
通過(guò)iTunes LIB管理iOS設(shè)備
https://github.com/xslim/mobileDeviceManager
檢測(cè)硬件,軟件以及運(yùn)行時(shí)當(dāng)前iOS或Mac OS X設(shè)備的顯示
https://github.com/lmirosevic/GBDeviceInfo
逆向工程Python武器庫(kù)
http://pythonarsenal.com/
OS X加密勒索軟件PoC
https://github.com/gdbinit/gopher
Frida
https://codeshare.frida。 re /
原始碼級(jí)偵錯(cuò)的XNU核心?https://bbs.ichunqiu.com/thread-48301-1-1.html
裝甲:功能強(qiáng)大的macOS有效負(fù)載加密工具,可繞過(guò)大部分AV
https:// www .freebuf.com / sectool / 190620.html
使用radare2逆向iOS Swift應(yīng)用程序
https://www.freebuf.com/articles/terminal/191595.html
調(diào)試macOS內(nèi)核很有趣
https://geosn0w.github.io/Debugging -macOS-Kernel-For-Fun /
MacMalware_2018
https://objective-see.com/downloads/MacMalware_2018.pdf
適用于iOS的OpenSource.Apple.Com的精華
http://newosxbook.com/tools/iOSBinaries.html
FortiAppMonitor:用于監(jiān)控macOS上的系統(tǒng)活動(dòng)的強(qiáng)大工具
https://www.freebuf.com/sectool/193258.html

樣品

https://objective-see.com/malware.html#resources

(4)IOS安全優(yōu)秀書(shū)籍

《破解和保護(hù)iOS應(yīng)用程序》
《 Mac OS X和iOS內(nèi)部構(gòu)件:以蘋(píng)果的核心》
《 OS X和iOS內(nèi)核編程》
《 OS X ABI Mach-O文件格式》
《 Mac黑客手冊(cè)》
《 Mac OS X Interals:一種系統(tǒng)方法》
《黑客攻防技術(shù)寶典-IOS實(shí)戰(zhàn)》
《 IOS應(yīng)用安全攻防實(shí)戰(zhàn)》
《 IOS應(yīng)用逆向工程》
《 IOS取證戰(zhàn)》
《安全技術(shù)大系:IOS取證分析》

(5)IOS安全推特

https://twitter.com/Technologeeks
https://twitter.com/osxreverser
https://twitter.com/Morpheus?______

(6)OSX / IOS漏洞分析文章

CVE-2016-1749
http://turingh.github.io/2016/04/29/CVE-2016-1749%E5%86%85%E6%A0%B8%E4%BB%A3%E7%A0%81 %E6%89%A7%E8%A1%8CPOC%E5%88%86%E6%9E%90 /

CVE-2016-1757
http://googleprojectzero.blogspot.com/2016/03/race-you-to-kernel.html
https://github.com/gdbinit/mach_race

CVE-2016-1824
http://marcograss.github.io/security/apple/cve/2016/05/16/cve-2016-1824-apple-iohidfamily-racecondition.html

IOS越獄中使用到的突破列表

### ipsw?ios10 ipsw
https://ipsw.me/所有
https://www.alliphone.com
https://www.theiphonewiki.com/wiki/Firmware_Keys
http://pastebin.com/FRMfanmT?https:// www.reddit.com/r/jailbreak/comments/4nyz1p/discussion_decrypted_kernel_cache_ios_10/d48cgd7?https://www.nowsecure.com/blog/2014/04/14/ios-kernel-reversing-step-by-step/
http:// /www.iphonehacks.com/download-iphone-ios-firmware


Mac下的一些軟件

http://sqwarq.com/detectx/

Mac下的安全軟件

https://objective-see.com/products.html

?

下載該資料的人也在下載 下載該資料的人還在閱讀
更多 >

評(píng)論

查看更多

下載排行

本周

  1. 1山景DSP芯片AP8248A2數(shù)據(jù)手冊(cè)
  2. 1.06 MB  |  532次下載  |  免費(fèi)
  3. 2RK3399完整板原理圖(支持平板,盒子VR)
  4. 3.28 MB  |  339次下載  |  免費(fèi)
  5. 3TC358743XBG評(píng)估板參考手冊(cè)
  6. 1.36 MB  |  330次下載  |  免費(fèi)
  7. 4DFM軟件使用教程
  8. 0.84 MB  |  295次下載  |  免費(fèi)
  9. 5元宇宙深度解析—未來(lái)的未來(lái)-風(fēng)口還是泡沫
  10. 6.40 MB  |  227次下載  |  免費(fèi)
  11. 6迪文DGUS開(kāi)發(fā)指南
  12. 31.67 MB  |  194次下載  |  免費(fèi)
  13. 7元宇宙底層硬件系列報(bào)告
  14. 13.42 MB  |  182次下載  |  免費(fèi)
  15. 8FP5207XR-G1中文應(yīng)用手冊(cè)
  16. 1.09 MB  |  178次下載  |  免費(fèi)

本月

  1. 1OrCAD10.5下載OrCAD10.5中文版軟件
  2. 0.00 MB  |  234315次下載  |  免費(fèi)
  3. 2555集成電路應(yīng)用800例(新編版)
  4. 0.00 MB  |  33566次下載  |  免費(fèi)
  5. 3接口電路圖大全
  6. 未知  |  30323次下載  |  免費(fèi)
  7. 4開(kāi)關(guān)電源設(shè)計(jì)實(shí)例指南
  8. 未知  |  21549次下載  |  免費(fèi)
  9. 5電氣工程師手冊(cè)免費(fèi)下載(新編第二版pdf電子書(shū))
  10. 0.00 MB  |  15349次下載  |  免費(fèi)
  11. 6數(shù)字電路基礎(chǔ)pdf(下載)
  12. 未知  |  13750次下載  |  免費(fèi)
  13. 7電子制作實(shí)例集錦 下載
  14. 未知  |  8113次下載  |  免費(fèi)
  15. 8《LED驅(qū)動(dòng)電路設(shè)計(jì)》 溫德?tīng)栔?/a>
  16. 0.00 MB  |  6656次下載  |  免費(fèi)

總榜

  1. 1matlab軟件下載入口
  2. 未知  |  935054次下載  |  免費(fèi)
  3. 2protel99se軟件下載(可英文版轉(zhuǎn)中文版)
  4. 78.1 MB  |  537798次下載  |  免費(fèi)
  5. 3MATLAB 7.1 下載 (含軟件介紹)
  6. 未知  |  420027次下載  |  免費(fèi)
  7. 4OrCAD10.5下載OrCAD10.5中文版軟件
  8. 0.00 MB  |  234315次下載  |  免費(fèi)
  9. 5Altium DXP2002下載入口
  10. 未知  |  233046次下載  |  免費(fèi)
  11. 6電路仿真軟件multisim 10.0免費(fèi)下載
  12. 340992  |  191187次下載  |  免費(fèi)
  13. 7十天學(xué)會(huì)AVR單片機(jī)與C語(yǔ)言視頻教程 下載
  14. 158M  |  183279次下載  |  免費(fèi)
  15. 8proe5.0野火版下載(中文版免費(fèi)下載)
  16. 未知  |  138040次下載  |  免費(fèi)
RM新时代网站-首页