Alfie CG
Trigon: exploiting coprocessors for fun and for profit (part 2)
Trigon: developing a deterministic kernel exploit for iOS (part 1)
A step-by-step guide to writing an iOS kernel exploit
An in-depth look at the code-signing process: ad-hoc signing
A comprehensive write-up of the checkm8 BootROM exploit
Getting untethered code execution on iOS 14.8