Vous trouverez ici des ressources que j’ai trouvé intéressantes et utiles pour mon apprentissage de la sécurité iOS.
Liens#
Google Project Project Zero#
2019 - A very deep dive into iOS Exploit chains found in the wild
2020 - Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641
2020 - Remote iPhone Exploitation Part 2: Bringing Light into the Darkness - a Remote ASLR Bypass
2021 - A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
2022 - CVE-2021-1782, an iOS in-the-wild vulnerability in vouchers
2022 - CVE-2021-30737, @xerub’s 2021 iOS ASN.1 Vulnerability
2023 - An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit
2025 - Blasting Past Webp - An analysis of the NSO BLASTPASS iMessage exploit
CitizenLab#
2020 - The Great iPwnJournalists Hacked with Suspected NSO Group iMessage ‘Zero-Click’ Exploit
2021 - Pegasus vs. PredatorDissident’s Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware
2025 - Sweet QuaDreams or Nightmare before Christmas? Bill Marczak on Dissecting an iOS 0-Day
Amnesty International#
Securelist (Kaspersky)#
2023 - Dissecting TriangleDB, a Triangulation spyware implant
2024 - Caught in the wild, past, present and future by Clem1
HEXACON#
Synacktiv#
Objective by the Sea#
Quarkslab#
2025 -First analysis of Apple’s USB Restricted Mode bypass (CVE-2025-24200)
2025 - Reverse engineering of Apple’s iOS 0-click CVE-2025-43300: 2 bytes that make size matter
iVerify#
Matthias Frielingsdorf#
2023 - Current State Of IOS Malware Detection - Matthias Frielingsdorf
2024 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS
2024 - You Shall Not PASS - Analysing a NSO iOS Spyware Sample
2025 - Predator Malware: Trust Broken At The Core - Matthias Frielingsdorf
Epsilon’s blog#
Apple Security Engineering and Research (SEAR)#
2023 - What if we had the SockPuppet vulnerability in iOS 16?
2025 - Memory Integrity Enforcement: A complete vision for memory safety in Apple devices
Google TAG (Threat Analysis Group)#
Alfie CG#
2024 - A step‑by‑step guide to writing an iOS kernel exploit
2025 - Trigon: developing a deterministic kernel exploit for iOS (part 1)
2025 - Trigon: exploiting coprocessors for fun and profit (part 2)