|
@_bazad | |||||
|
I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB: github.com/googleprojectz…
|
||||||
|
||||||
|
Brandon Azad
@_bazad
|
28. lis |
|
KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass: googleprojectzero.blogspot.com/2019/10/ktrw-j…
|
||
|
|
||
|
Matt
@mattp_12
|
28. lis |
|
I have no idea what this means but it sounds important
|
||
|
|
||
|
Micro
@HeyItsMicro
|
28. lis |
|
this is my exact thought process, let’s see what happens here
|
||
|
|
||
|
Simo'w.B
@SimowB
|
28. lis |
|
Why do I feel like iPhone X is going to be the iPhone 4 of 2019
|
||
|
|
||
|
Yanek fuxs
@1Petter1
|
28. lis |
|
Just not as laggy in it’s final form xD (I’m talking about iOS 7)
|
||
|
|
||
|
John Coates
@JohnCoatesDev
|
29. lis |
|
Wow! We really have entered the golden age of iOS security research
|
||
|
|
||
|
Dani
@DaniiG_RL
|
28. lis |
|
|
||
|
🏳️🌈Matt.🏳️🌈💙
@MattStar45
|
28. lis |
|
Neat, wish I had an a11 device this
|
||
|
|
||
|
Jake
@ItsRedPrimeArmy
|
29. lis |
|
Awesome Job Brandon :)
|
||
|
|
||
|
TotallyNotNero
@TotallyNotNero
|
28. lis |
|
Sweet!
|
||
|
|
||