- Exploiting Intel Graphics Kernel Extensions on macOS to Escape the Safari Sandbox https://blog.ret2.io/2022/06/29/pwn2own-2021-safari-sandbox-intel-graphics-exploit/ 2 comments netsec
Linking pages
- The LDT, a Perfect Home for All Your Kernel Payloads | RET2 Systems Blog https://blog.ret2.io/2022/08/17/macos-dblmap-kernel-exploitation/ 2 comments
- CVE-2023-23504: XNU Heap Underwrite in dlil.c - Adam Doupé https://adamdoupe.com/blog/2023/01/23/cve-2023-23504-xnu-heap-underwrite-in-dlil-dot-c/ 0 comments
Linked pages
- Kaby Lake - Wikipedia https://en.wikipedia.org/wiki/Kaby_Lake#Mobile_processors 245 comments
- Mach (kernel) - Wikipedia https://en.wikipedia.org/wiki/Mach_(kernel) 95 comments
- Coffee Lake - Wikipedia https://en.wikipedia.org/wiki/Coffee_Lake 86 comments
- Project Zero: A survey of recent iOS kernel exploits https://googleprojectzero.blogspot.com/2020/06/a-survey-of-recent-ios-kernel-exploits.html 70 comments
- Binary Ninja http://binary.ninja 57 comments
- Zero Day Initiative — Pwn2Own 2021 - Schedule and Live Results https://www.zerodayinitiative.com/blog/2021/4/2/pwn2own-2021-schedule-and-live-results 0 comments
- About the security content of macOS Big Sur 11.4 - Apple Support https://support.apple.com/en-us/HT212529 0 comments
Related searches:
Search whole site: site:blog.ret2.io
Search title: Exploiting Intel Graphics Kernel Extensions on macOS | RET2 Systems Blog
See how to search.