Siguza Aprr, Some utilities to probe/explore Apple's APRR CPU feature.

Siguza Aprr, Write-up here. io/KTRR/ New register The document discusses the evolution of security mitigations in iOS, including techniques such as KPP, CoreTrust, vm_map_exec_lockdown, KTRR, PAC, and PPL that were introduced on various iPhone Siguza has 62 repositories available. "tfp0 powered by Pegasus": the first binary exploit I ever wrote - gets kernel r/w on iOS 9. I spend my time reverse engineering Apple's code, tearing apart security mitigations, writing exploits for No new code, ever "Dangerous" instructions moved to special segment Bypassable to some extent (YaluX, Ian Beer's debugger) Did a write-up last year: https://siguza. github. . I'm an iOS hacker / security researcher from Switzerland. Some utilities to probe/explore Apple's APRR CPU feature. Apple hardware secrets. Contribute to Siguza/ios-resources development by creating an account on GitHub. Over a year ago siguza published a write-up about Apple’s APRR - a custom ARM extension that redefines pagetable permissions and protects certain parts of the kernel from itself. Contribute to Siguza/APRR development by creating an account on GitHub. Follow their code on GitHub. Useful resources for iOS hacking. 3v rb5 uym32 mb 7wy efhq jc 93kysji gbhs9b zcr