RSS.Social

Alfie CG

follow: @[email protected]

Posts

Trigon: exploiting coprocessors for fun and for profit (part 2)

Trigon: developing a deterministic kernel exploit for iOS (part 1)

A step-by-step guide to writing an iOS kernel exploit

An in-depth look at the code-signing process: ad-hoc signing

A comprehensive write-up of the checkm8 BootROM exploit

Getting untethered code execution on iOS 14.8