osx-security-awesome 

A collection of OSX/iOS security related resources
News
- The Story of CVE-2018-4184 or how a vulnearbility in OSX’s Speech
system allowed apps with access to the microphone to escape sandbox
restrictions ### iOS
vulnerability write-up
- A repository of iOS vulnerability write-ups as they are
released
- Also includes conference papers ### iOS
display bugs
- Regularly updated list of iOS display bugs
- Frequently updated blog that provides a good summary of the latest
unique mac malware.
- Intego’s corporate Mac security blog often contains recent and
in-depth analysis of mac malware and other security issues
- Objective-See’s blog often contains in-depth breakdowns of malware
they’ve reverse engineered and vulnarabilities they’ve discovered.
- Resource to help educate Mac users about security issues. Contains
historical as well as timely security updates.
- Another Mac security blog. This often includes more in-depth
analysis of specific threats.
- Not strictly security-specific but it contains jailbreaking
information which has security implications
Hardening
- Utilities, tools, and scripts for managing and tracking a fleet of
Macintoshes in a corporate environment collected by Google
- A RESTful API and client that helps Apple Mac users determine if
they are running the expected EFI firmware version given their Mac
hardware and OS build version
- Everything you need to know about the launchd service
- Step-by-step guide to the startup process
- Google’s system hardening guide
- How to for using OSX’s sandbox system
- Reversing the Apple sandbox
- Paper
- Hardening guide for El Capitan
- Protecting your hardware from “evil maid” attacks
Malware sample sources
Digital Forensics /
Incident Response (DFIR)
Reverse engineering
Presentations and Papers
Virus and exploit writeups
Meltdown
- Deep dive into the interprocess communication and its design
flaws
- Gaining access through the wireless subsystem
- Details the discovery of a vulnerability in Apple’s Call handoff
between mobile and desktop through analyzing network traffic.
Exploiting the Wifi
Stack on Apple Devices
Google’s Project Zero series of articles that detail vulnerabilities
in the wireless stack used by Apple Devices * Over
The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1) * Over
The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 2) * Over
The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices
* Over
The Air - Vol. 2, Pt. 2: Exploiting The Wi-Fi Stack on Apple Devices
* Over
The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple
Devices
- A message that crashes iMessage
- Looks similar to previous
bugs
rendering Arabic characters
EvilOSX - Pure python
post-exploitation toolkit
Other OSX Awesome lists