
Two macOS Persistence Tricks Abusing Plugins
Similar to DLL sideloading, legit plugins on macOS could be abused to load executable code on startup.

Similar to DLL sideloading, legit plugins on macOS could be abused to load executable code on startup.

Similar to DLL sideloading, legit plugins on macOS could be abused to load executable code on startup.

Relying on pid to validate IPC peer is unsafe.

Relying on pid to validate IPC peer is unsafe.

Applying web security tricks to macOS LPE bugs.

Applying web security tricks to macOS LPE bugs.

TOCTOU bug in CoreFoundation and state change of sandbox lockdown on macOS Safari, leading to easy sandbox escape.

TOCTOU bug in CoreFoundation and state change of sandbox lockdown on macOS Safari, leading to easy sandbox escape.

The private API design of XPC could make it hard for 3rd-party developers to write security code.

The private API design of XPC could make it hard for 3rd-party developers to write security code.

Code signature bypass and insecure sideloading result in privilege escalation in Microsoft Office 2016 for Mac

Code signature bypass and insecure sideloading result in privilege escalation in Microsoft Office 2016 for Mac

Get some real life 0day by playing CTF challenges.

Get some real life 0day by playing CTF challenges.

Attacking the operating system by using its own security mechanism.

Attacking the operating system by using its own security mechanism.

Better not leave inspectable Electron instances on production.

Better not leave inspectable Electron instances on production.

Abuse SQLite's legit feature to turn arbitrary SQL queries into arbitrary code execution and pwn php

Abuse SQLite's legit feature to turn arbitrary SQL queries into arbitrary code execution and pwn php