GitHub - kai5263499/osx-security-awesome: A collection of OSX and iOS security resources
Skip to content

kai5263499/osx-security-awesome

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

osx-security-awesome AwesomeTravis


A collection of OSX/iOS security related resources


News


  • The Story of CVE-2018-4184 or how a vulnearbility in OSX's Speech system allowed apps with access to the microphone to escape sandbox restrictions
  • A repository of iOS vulnerability write-ups as they are released
  • Also includes conference papers
  • Regularly updated list of iOS display bugs
  • Frequently updated blog that provides a good summary of the latest unique mac malware.
  • Intego's corporate Mac security blog often contains recent and in-depth analysis of mac malware and other security issues
  • Objective-See's blog often contains in-depth breakdowns of malware they've reverse engineered and vulnarabilities they've discovered.
  • Resource to help educate Mac users about security issues. Contains historical as well as timely security updates.
  • Another Mac security blog. This often includes more in-depth analysis of specific threats.
  • Not strictly security-specific but it contains jailbreaking information which has security implications

Hardening

  • Utilities, tools, and scripts for managing and tracking a fleet of Macintoshes in a corporate environment collected by Google
  • System monitoring tool
  • A RESTful API and client that helps Apple Mac users determine if they are running the expected EFI firmware version given their Mac hardware and OS build version
  • Everything you need to know about the launchd service
  • Step-by-step guide to the startup process
  • Google's system hardening guide
  • How to for using OSX's sandbox system
  • Reversing the Apple sandbox
  • Paper
  • Hardening guide for El Capitan
  • Protecting your hardware from "evil maid" attacks

Malware sample sources

  • Curated list of malware samples. Use this list if you're looking for interesting samples to reverse engineer

Digital Forensics / Incident Response (DFIR)

APOLLO tool

  • Python tool for proactive detection tool for malware and trojans
  • Source
  • Security auditing tool for UNIX-based systems, including macOS
  • OSQuery module to give you a report of 32bit processes running on a 10.14 machine
  • Locations of sensitive files
  • Forensics framework
  • Physical memory manipulation
  • Memory analysis toolkit
  • Collection of OSX and iOS artifacts
  • Forensics utility developed by Yelp
  • OSX incident response at GitHub Slides
  • How to debug an iOS application that you didn't create
  • Paid service for analyzing the iTunes backup of your iOS device
  • Mac Artifact Parsing Tool for processing full disk images and extracting useful information
  • The author also has a collection of DFIR scripts

Reverse engineering

  • Frequently updated book on OSX internals
  • Another Awesome-style list dedicated to OSX reverse engineering resources
  • A collection of puzzles to test your reverse engineering skills
  • Walkthrough for Coca applications
  • Source code for iOS kernel
  • Very good list of various crackme challenges that is categorized by level and OS
  • Awesome list dedicated to reversing

Presentations and Papers

  • Examining iOS applications for poorly guarded secrets
  • Fuzzing and exploiting OSX kernel bugs
  • Video, hacking Mac's extensible firmware interface (EFI)
  • security flaws in IOKit's graphics acceleration that lead to exploitation from the browser
  • An exploration of the sandbox protections policies
  • Presentation

Virus and exploit writeups

  • Exploration of QuartzCore/CoreAnimation flaw leading to a malicious application being able to read restricted memory.
  • Load iOS12 kernelcaches and PAC code in IDA
  • Proof of concept for CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6
  • MachO tricks - Appears to be slides from a presentation that ends with the CVE listed above
  • How the public warning system can be used as an attack vector
  • A flaw in Unified Logs leaks the password for encrypted APFS volumes

Meltdown

  • Firmware bootkit
  • A post on the resurgence of bootkits and how to defend against them
  • Exploration of a Remote Access Toolkit
  • First OSX ransomware

EFI attack that exploits a vulnerability in suspend-resume cycle Sentinel One write-up

  • Deep dive into the interprocess communication and its design flaws
  • Gaining access through the wireless subsystem
  • Details the discovery of a vulnerability in Apple's Call handoff between mobile and desktop through analyzing network traffic.

Exploiting the Wifi Stack on Apple Devices

Google's Project Zero series of articles that detail vulnerabilities in the wireless stack used by Apple Devices

  • A message that crashes iMessage
  • Looks similar to previous bugs rendering Arabic characters

Useful tools and guides

  • Mac enrollment helper provided by IBM
  • Audit and fix macOS High Sierra (10.13.x) security settings
  • Darwin/macOS emulation layer for Linux
  • Open source kernel monitoring
  • Developer jailbreak for Apple Watch
  • Deep dive into Secure Boot on 2018 MacBook Pro
  • Tutorial on getting an iOS kernel to run in QEMU
  • Monitor macOS for malicious activity
  • source
  • Audits system artifacts to help you identify unknown and novel threats
  • Utility to test for code-sign bypass vulnerability
  • Mac menubar item that lets you know about security events on your system
  • Automated malware analysis on macOS
  • method interface exchange
  • C and Python debugging framework for OSX
  • store and retrieve bitcode from Mach-O binary
  • retrieve and change information about mach-o files
  • kernel module for OSX to defeat anti-debugging protection
  • CLI utility for creating and modifying DMG files
  • convert dmg to iso
  • Homebrew tap for security-related utilities
  • Collection of really useful shell commands
  • Dump keychain credentials
  • Listing startup items. Also includes VirusTotal information
  • GUI for launchd
  • Excellent OSX debugger (requires license)
  • Python utility for generating imphash fingerprints for OSX binaries
  • Wireless scanning and packet capturing
  • Framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode
  • GUI for generating .app bundles
  • CLI for generating .pkg installers
  • System firmware checker by Intel
  • A collection of OSX rootkit ideas
  • Remote control library for fuzz testing iOS apps
  • Blackbox fuzz testing for iOS apps (requires jailbreak)
  • Contains a script for decrypting an encrypted iOS backup archive
  • A MenuBar app to automatically audit your Mac for basic security hygiene.
  • Vulnerability Management app for individuals. It helps to keep macOS and installed applications updated.
  • Open source vulnerability and misconfiguration scanning for macOS hosts + much more.
  • iOS malware, its types, methods of gathering forensics information
  • Part one that covers basic uses

Remote Access Toolkits

EggShell surveillance tool - Works on OSX and jailbroken iOS

EvilOSX - Pure python post-exploitation toolkit

Worth following on Twitter

Other OSX Awesome lists