http://samdmarshall.com
https://www.exploit-db.com
https://reverse.put.as
http://highaltitudehacks.com/security/
http://www.dllhook.com/
http:// /www.securitylearn.net/archives/
http://securitycompass.github.io/iPhoneLabs/index.html
http://security.ios-wiki.com
http://www.opensecuritytraining.info/IntroARM.html
https: //truesecdev.wordpress.com/
http://resources.infosecinstitute.com/ios-application-security-part-1-setting-up-a-mobile-pentesting-platform/
http://esoftmobile.com/2014/ 02/14 / ios-security /
http://bbs.iosre.com
http://bbs.chinapyg.com
http://blog.pangu.io/
http://yonsm.net/
http:// nianxi。净/
http://cocoahuke.com/
https://blog.0xbbc.com
http://blog.imaou.com/
https://github.com/pandazheng/iOSAppReverseEngineering
http://drops.wooyun.org
http://bbs.pediy.com
http: //www.blogfshare.com/
https://github.com/michalmalik/osx-re-101
http://blog.qwertyoruiop.com/
https://github.com/secmobi/wiki.secmobi.com
http: //contagioexchange.blogspot.com/
http://contagiominidump.blogspot.com/
https://github.com/secmobi
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Guide_Development_Project
http:// blog.dornea.nu/2014/10/29/howto-ios-apps-static-analysis/
http://www.dllhook.com/post/58.html
http://thexploit.com/category/secdev/
https://github.com/secmobi/wiki.secmobi.com
https://github.com/mdsecresearch
http://sectools.org/tag/os-x/
http://googleprojectzero.blogspot.com/
http: //googleprojectzero.blogspot.com/2014/10/more-mac-os-x-and-iphone-sandbox.html
http://www.macexploit.com/
https://code.google.com/p/google -security-research / issues / list?can = 1&q = iOS&sort = -id&colspec = ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary
https://code.google.com/p/google-security-research/issues / list?can = 1&q = OSX&sort = -id&colspec = ID + Type + Status + Priority + Milestone + Owner + Summary&cells = tiles
http://googleprojectzero.blogspot.com/2014/11/pwn4fun-spring-2014-safari-part -ii.html
https://www.blackhat.com/docs/us-15/materials/us-15-Lei-Optimized-Fuzzing-IOKit-In-iOS-wp.pdf
https://www.youtube.com/watch?v = rxUgw5bEG3Y
https://www.theiphonewiki.com/wiki/固件
http://www.trustedbsd.org/mac.html
http://googleprojectzero.blogspot.com/2014/10/more-mac-os-x- and-iphone-sandbox.html
https://code.google.com/p/google-security-research/issues/list?can=1&q=OSX&sort=-id&colspec=ID+Type+Status+Priority+Milestone+Owner+摘要&cells = tiles
https://support.apple.com/zh-cn/HT205731
https://www.apple.com/support/security/
http://opensource.apple.com/tarballs/
https:// mobile- security.zeef.com/oguzhan.topgu
http://www.powerofcommunity.net
http://cn.0day.today/exploits
https://recon.cx/2016/training/trainingios-osx.html
https://www.exploit-db.com/osx-rop-exploits-evocam-case-study/
https://www.offensive-security .com / vulndev / evocam-remote-buffer-overflow-on-osx /
https://www.yumpu.com/zh-CN/document/view/7010924/ios-kernel-heap-armageddon
http://contagiodump.blogspot。 com /
http://www.dllhook.com/post/138.html
http://shell-storm.org/blog/Return-Oriented-Programming-and-ROPgadget-tool/
https://medium.com/@ harryworld / 100-days-of-osx-development-e61591fcb8c8#.vxyuyse12
http://www.poboke.com/study/reverse
https://www.offensive-security.com/vulndev/evocam-remote-buffer-overflow -on-osx /
https://www.exploit-db.com/osx-rop-exploits-evocam-case-study/
http://phrack.org/issues/69/1.html
https://www.exploit-db.com/docs/28479.pdf
https://speakerdeck.com/milkmix/ios-malware-myth-or-reality
https://bbs.pediy.com/thread-223117。 htm
http://datatheorem.github.io/TrustKit/
http://ho.ax/posts/2012/02/resolving-kernel-symbols/
http://www.securitylearn.net/tag/pentesting-ios-apps/
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
https://github.com/secmobi/wiki.secmobi。 com
http://bbs.iosre.com/t/debugserver-lldb-gdb/65
http://bbs.pediy.com/showthread.php?t=193859
http://bbs.pediy.com/showthread.php ?t = 192657&viewgoodnees = 1&prefixid =
http://blog.darkrainfall.org/2013/01/os-x-internals/
http://dvlabs.tippingpoint.com/blog/2009/03/06/reverse-engineering-iphone -appstore-binaries
http://drops.wooyun.org/papers/5309
http://www.blogfshare.com/category/ios-secure
https://www.safaribooksonline.com/library/view/hacking-and-securing/9781449325213/ch08s04.html
http://soundly.me/osx-injection-override-tutorial-hello-world/
https:// nadavrub .wordpress.com / 2015/07/23 / injecting-code-to-an-ios-appstore-app /
http://blog.dewhurstsecurity.com/
https://github.com/project-imas
https:// github.com/iSECPartners
https://www.nowsecure.com/blog/
http://lightbulbone.com/
http://www.tanhao.me/pieces/1515.html/
http://dongaxis.github.io /
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
包含O'Reilly的iOS 9 Swift编程手册的所有示例代码
https://github.com/vandadnp/iOS-9-Swift-Programming-Cookbook
XCodeGhost清除脚本
https://github.com/pandazheng/XCodeGhost-Clean
Apple OS X ROOT提权API后门
https://github.com/tihmstar/rootpipe_exploit
适用于iOS和OS的轻松且通用的SSL固定X
https://github.com/datatheorem/TrustKit
使用shellcode
https修补PE,ELF,Mach-O二进制文件://github.com/secretsquirrel/the-backdoor-factory
iReSign允许的iDevice的应用程序包(的.ipa)文件,以便与苹果的数字证书分发给签署或辞职
https://github.com/maciekish/iReSign
马赫-O加载命令反混淆器
https://github.com/x43x61x69/Mach-O-Prettifier
Dylib插入Mach-O文件
https://github.com/Tyilo/insert_dylib
dylib用于mach-o二进制文件的注入器
https://github.com/KJCracks/yololib
快速的iOS可执行转储程序
https://github.com/KJCracks/Clutch
Mac OS X的libimobiledevice库的二进制分发
https://github.com/benvium/libimobiledevice-macosx
与OS X上的dylib劫持有关的python实用程序
https:// /github.com/synack/DylibHijack
OSX dylib注入
https://github.com/scen/osxinj
IOS IPA软件包精简并辞职
https://github.com/Yonsm/iPAFine
ROP漏洞利用
https://github.com/JonathanSalwan / ROPgadget
对任何Mach-o文件进行类转储而不从dyld_shared_cache
https://github.com/limneos/classdump-dyld中提取文件
扫描IPA文件并解析其info.plist
https://github.com/apperian/iOS-checkIPA
A通过库注入的PoC Mach-O感染器
https://github.com/gdbinit/osx_boubou
IOS-Headers
https://github.com/MP0w/iOS-Headers
Mac OS X的进程间代码注入
https://github.com/ rentzsch / mach_inject
OS X Auditor是免费的Mac OS X计算机取证工具
https://github.com/jipegit/OSXAuditor
删除osx的PIE
https://github.com/CarinaTT/MyRemovePIE
IDA https的TE可执行格式加载器
: //github.com/gdbinit/TELoader
移动安全框架
https://github.com/ajinabraham/Mobile-Security-Framework-MobSF
一个库,可以动态重新绑定运行在iOS上的Mach-O二进制文件中的符号
https://github.com/facebook/fishhook
OSX和iOS相关安全工具
https://github.com/ashishb/osx-and-ios-security-awesome
Introspy-Analyzer
https://github.com/iSECPartners/Introspy-Analyzer
将加密的iPhone应用程序中解密的mach-o文件从内存转储到内存磁盘
https://github.com/stefanesser/dumpdecrypted
适用于iOS和OS X的Keychain的简单Swift包装器
https://github.com/kishikawakatsumi/KeychainAccess
idb是一种工具,可简化iOS渗透测试和研究的一些常见任务
使用Parse作为后端的https://github.com/dmayer/idb Pentesting应用程序
https://github.com/igrekde/ParseRevealer
iOS逆向工程工具包
https://github.com/Vhacker/iRET
XNU-Mac OS X内核
https://github.com/opensource-apple/xnu
OSX的代码注入+有效负载通信
https://github.com/mhenr18/injector
iOS相关代码
https://github.com/samdmarshall/iOS-Internals
OSX注入教程:Hello World
https://github.com/arbinger/osxinj_tut
Reveal加载程序将libReveal.dylib(Reveal.app支持)动态加载到越狱设备上的iOS应用程序中
https://github.com/heardrwt/RevealLoader
NSUserDefaults类别,带有AES加密/解密密钥和值
https://github.com/NZN/NSUserDefaults-AESEncryptor
黑 盒工具可禁用SSL证书验证
https://github.com/iSECPartners/ios-ssl-kill-switch
应用逆向工程抽奖插件
https://github.com/iosre/iosrelottery
未经测试的iOS调整,以挂钩OpenSSL函数
https://github.com/nabla-c0d3/iOS-hook-OpenSSL
IOS * .plist加密器项目。保护您的.plist文件免于越狱
https://github.com/FelipeFMMobile/ios-plist-encryptor
iOS ipa文件重新设计工具
https://github.com/hayaq/recodesign
扫描iPhone / iPad / iPod应用程序中的PIE标志
https://github.com/stefanesser/.ipa-PIE-Scanner
通过cve-2015-1140的xnu本地特权升级IOHIDSecurePromptClient injectStringGated堆溢出| poc || gtfo
https://github.com/kpwn/vpwn
MachOView
https://github.com/gdbinit/MachOView
与iOS设备通信的跨平台协议库
https://github.com/libimobiledevice/libimobiledevice
WireLurkerDetector
https://github.com/pandazheng/WireLurker
发行按照GPL牌
https://github.com/p0sixspwn/p0sixspwn
通过CVE-2015 XNU本地权限提升
https://github.com/kpwn/tpwn
一个简单的通用OSX / iOS上的内存编辑器(游戏培训师)
https://github.com/pandazheng/HippocampHairSalon
BinaryCookieReader源码
https://github.com/pandazheng/BinaryCookieReader
Tiamo的引导程序
https://github.com/pandazheng/macosxbootloader
不完整的iOS 8.4.1越狱,由Kim Jong Cracks
https://github.com/pandazheng/yalu
OSX安全扫描程序
https http://github.com/openscanner/XGuardian
示例内核扩展,演示如何从kextstat隐藏
https://github.com/rc0r/KextHider
示例Mac OS X内核扩展,用于解析运行中的内核映像中的符号
https:// github .com / snare / KernelResolver
示例Mac OS X(Mountain Lion)内核扩展,演示了如何通过劫持getdirentries系统调用来隐藏文件
https://github.com/rc0r/FileHider
示例Mac OS X(Mountain Lion)内核扩展,演示了如何通过修改allproc和pidhashtbl隐藏进程的方法
https://github.com/rc0r/ProcessHider
Mach-O反汇编程序。现在兼容64位和Xcode 6
https://github.com/x43x61x69/otx
一个Mach-O二进制代码签名去除器
https://github.com/x43x61x69/codeunsign
一个Mach-O加载命令deobfuscator
https://github.com/ x43x61x69 /马赫-O-Prettifier
很简单的键盘记录器为自量化在Mac OS X
https://github.com/dannvix/keylogger-osx
通过iTunes LIB管理iOS设备
https://github.com/xslim/mobileDeviceManager
检测硬件,软件以及运行时当前iOS或Mac OS X设备的显示
https://github.com/lmirosevic/GBDeviceInfo
逆向工程Python武器库
http://pythonarsenal.com/
OS X加密勒索软件PoC
https://github.com/gdbinit/gopher
Frida
https://codeshare.frida。 re /
原始码级侦错的XNU核心 https://bbs.ichunqiu.com/thread-48301-1-1.html
装甲:功能强大的macOS有效负载加密工具,可绕过大部分AV
https:// www .freebuf.com / sectool / 190620.html
使用radare2逆向iOS Swift应用程序
https://www.freebuf.com/articles/terminal/191595.html
调试macOS内核很有趣
https://geosn0w.github.io/Debugging -macOS-Kernel-For-Fun /
MacMalware_2018
https://objective-see.com/downloads/MacMalware_2018.pdf
适用于iOS的OpenSource.Apple.Com的精华
http://newosxbook.com/tools/iOSBinaries.html
FortiAppMonitor:用于监控macOS上的系统活动的强大工具
https://www.freebuf.com/sectool/193258.html
https://objective-see.com/malware.html#resources
《破解和保护iOS应用程序》
《 Mac OS X和iOS内部构件:以苹果的核心》
《 OS X和iOS内核编程》
《 OS X ABI Mach-O文件格式》
《 Mac黑客手册》
《 Mac OS X Interals:一种系统方法》
《黑客攻防技术宝典-IOS实战》
《 IOS应用安全攻防实战》
《 IOS应用逆向工程》
《 IOS取证战》
《安全技术大系:IOS取证分析》
https://twitter.com/Technologeeks
https://twitter.com/osxreverser
https://twitter.com/Morpheus ______
CVE-2016-1757
http://googleprojectzero.blogspot.com/2016/03/race-you-to-kernel.html
https://github.com/gdbinit/mach_race
CVE-2016-1824
http://marcograss.github.io/security/apple/cve/2016/05/16/cve-2016-1824-apple-iohidfamily-racecondition.html
### ipsw ios10 ipsw
https://ipsw.me/所有
https://www.alliphone.com
https://www.theiphonewiki.com/wiki/Firmware_Keys
http://pastebin.com/FRMfanmT https:// www.reddit.com/r/jailbreak/comments/4nyz1p/discussion_decrypted_kernel_cache_ios_10/d48cgd7 https://www.nowsecure.com/blog/2014/04/14/ios-kernel-reversing-step-by-step/
http:// /www.iphonehacks.com/download-iphone-ios-firmware
这个章节介绍scikit-learn 所提供之机器学习资料集,最常用的主要有: 手写数字辨识 鸢尾花资料集 Ex 1: The digits 手写数字辨识 Ex 3: The iris 鸢尾花资料集
资料内容涵盖 小白(前置知识) 初级(了解初识) 中级(系统学习) 高级(应用拓展) 部分文件清单 /小白(前置知识)/ /小白(前置知识)/数学/ /小白(前置知识)/数学/复分析(原书第3版) L /小白(前置知识)/数学/复分析笔记 /小白(前置知识)/数学/小波与傅里叶分析基础 /小白(前置知识)/数学/线性代数 /小白(前置知识)/数学/线性代数第8版 /小白(前置知识
注意:本文档已失效,请浏览 Istio 官方文档。本书中的 Service Mesh 章节已不再维护,请转到 istio-handbook 中浏览。 8月1日0点,Istio 1.0发布,已生产就绪!大家都已经跃跃欲试了,几天前我发布了一键在本地搭建运行Istio 1.0的分布式Kubernetes集群教程,在本地搭建起来还是有些门槛,稍显复杂,现在我推荐几个可以在线上学习的地方。这是目前搜集的比
资源教程: 综合类 前端知识体系 前端知识结构 Web前端开发大系概览 Web前端开发大系概览-中文版 Web Front-end Stack v2.2 免费的编程中文书籍索引 前端书籍 前端免费书籍大全 前端知识体系 免费的编程中文书籍索引 智能社 - 精通JavaScript开发 重新介绍 JavaScript(JS 教程) 麻省理工学院公开课:计算机科学及编程导论 JavaScript中的t
NLTK语料库 NLTK包含多种语料库,举一个例子:Gutenberg语料库,执行: nltk.corpus.gutenberg.fileids() 返回Gutenberg语料库的文件标识符 [u'austen-emma.txt', u'austen-persuasion.txt', u'austen-sense.txt', u'bible-kjv.txt', u'blake-poems.tx
机器学习资料集/ 范例三: The iris dataset http://scikit-learn.org/stable/auto_examples/datasets/plot_iris_dataset.html 这个范例目的是介绍机器学习范例资料集中的iris 鸢尾花资料集 (一)引入函式库及内建手写数字资料库 #这行是在ipython notebook的介面裏专用,如果在其他介面则可以拿掉