Here you can find resources I’ve found interesting & useful for my journey in learning more about iOS security.
Links#
Google Project Project Zero#
2020 - Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641
2020 - Remote iPhone Exploitation Part 2: Bringing Light into the Darkness - a Remote ASLR Bypass
2021 - A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
2022 - CVE-2021-1782, an iOS in-the-wild vulnerability in vouchers
2022 - CVE-2021-30737, @xerub’s 2021 iOS ASN.1 Vulnerability
2023 - An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit
2025 - Blasting Past Webp - An analysis of the NSO BLASTPASS iMessage exploit
CitizenLab#
2020 - The Great iPwnJournalists Hacked with Suspected NSO Group iMessage ‘Zero-Click’ Exploit
2021 - Pegasus vs. PredatorDissident’s Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware
2025 - Sweet QuaDreams or Nightmare before Christmas? Bill Marczak on Dissecting an iOS 0-Day
Securelist (Kaspersky)#
2023 - Dissecting TriangleDB, a Triangulation spyware implant
2024 - Caught in the wild, past, present and future by Clem1
HEXACON#
Synacktiv#
Quarkslab#
Jamf Threat Labs#
iVerify#
Apple Security Engineering and Research (SEAR)#
Google TAG (Threat Analysis Group)#
Alfie CG#
2024 - A step‑by‑step guide to writing an iOS kernel exploit
2025 - Trigon: developing a deterministic kernel exploit for iOS (part 1)
2025 - Trigon: exploiting coprocessors for fun and profit (part 2)