<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CodeColorist</title>
    <link>https://codecolor.ist/</link>
    <description>Security Research mainly on macOS / iOS</description>
    <language>en</language>
    <lastBuildDate>Fri, 31 Oct 2025 00:00:00 GMT</lastBuildDate>
    <atom:link href="https://codecolor.ist/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Abusing tclsh to Load (Remote) Shellcode on macOS</title>
      <link>https://codecolor.ist/posts/2025-10-31-macos-abuse-tcl-lol/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2025-10-31-macos-abuse-tcl-lol/</guid>
      <pubDate>Fri, 31 Oct 2025 00:00:00 GMT</pubDate>
      <description>Yet another LOOBins</description>
    </item>
    <item>
      <title>Mistuned Part 3: PAC Bypass</title>
      <link>https://codecolor.ist/posts/2021-09-10-mistuned-part-iii/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2021-09-10-mistuned-part-iii/</guid>
      <pubDate>Fri, 10 Sep 2021 00:00:00 GMT</pubDate>
      <description>Bypass hardware assisted mitigation using Objective-C runtime.</description>
    </item>
    <item>
      <title>Mistuned Part 2: Butterfly Effect</title>
      <link>https://codecolor.ist/posts/2021-08-05-mistuned-part-ii/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2021-08-05-mistuned-part-ii/</guid>
      <pubDate>Thu, 05 Aug 2021 00:00:00 GMT</pubDate>
      <description>A simple access control issue makes a huge difference, leading to infoleak and use after free.</description>
    </item>
    <item>
      <title>Mistuned Part 1: Client-side XSS to Calculator and More</title>
      <link>https://codecolor.ist/posts/2021-08-04-mistuned-part-i/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2021-08-04-mistuned-part-i/</guid>
      <pubDate>Wed, 04 Aug 2021 00:00:00 GMT</pubDate>
      <description>Remotely pwn iOS and pop up arbitrary app with 0 memory corruption.</description>
    </item>
    <item>
      <title>Quick Analysis for the SSID Format String Bug</title>
      <link>https://codecolor.ist/posts/2021-06-20-quick-analysis-wifid/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2021-06-20-quick-analysis-wifid/</guid>
      <pubDate>Sun, 20 Jun 2021 00:00:00 GMT</pubDate>
      <description>A rogue Wi-Fi hotspot can crash your phone.</description>
    </item>
    <item>
      <title>See No Eval: Runtime Dynamic Code Execution in Objective-C</title>
      <link>https://codecolor.ist/posts/2021-01-16-see-no-eval-runtime-code-execution-objc/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2021-01-16-see-no-eval-runtime-code-execution-objc/</guid>
      <pubDate>Sat, 16 Jan 2021 00:00:00 GMT</pubDate>
      <description>There is a turing-complete querying language embeded in Objective-C hidden in plain sight.</description>
    </item>
    <item>
      <title>X Site eScape (Part II): Look Up a Shell in the Dictionary</title>
      <link>https://codecolor.ist/posts/2020-08-06-x-site-escape-part-ii-look-up-a-shell-in-the-dictionary/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2020-08-06-x-site-escape-part-ii-look-up-a-shell-in-the-dictionary/</guid>
      <pubDate>Thu, 06 Aug 2020 00:00:00 GMT</pubDate>
      <description>A funny bug chain turing inter-process XSS to native code execution for sandbox escape.</description>
    </item>
    <item>
      <title>X Site eScape (Part III): CVE-2020-9860, A Copycat</title>
      <link>https://codecolor.ist/posts/2020-07-01-x-site-escape-part-iii-cve-2020-9860-a-copycat/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2020-07-01-x-site-escape-part-iii-cve-2020-9860-a-copycat/</guid>
      <pubDate>Wed, 01 Jul 2020 00:00:00 GMT</pubDate>
      <description>Copycat.</description>
    </item>
    <item>
      <title>X Site eScape (Part I): Exploitation of An Old CoreFoundation Sandbox Bug</title>
      <link>https://codecolor.ist/posts/2020-05-28-x-site-escape-part-i-exploitation-of-and-old-corefoundation-sandbox-bug/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2020-05-28-x-site-escape-part-i-exploitation-of-and-old-corefoundation-sandbox-bug/</guid>
      <pubDate>Thu, 28 May 2020 00:00:00 GMT</pubDate>
      <description>Triggering inter-process XSS for fun and profit.</description>
    </item>
    <item>
      <title>Revisiting An Old MediaRemote Bug (CVE-2018-4340)</title>
      <link>https://codecolor.ist/posts/2020-05-27-revisiting-an-old-mediaremote-bug-cve-2018-4340/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2020-05-27-revisiting-an-old-mediaremote-bug-cve-2018-4340/</guid>
      <pubDate>Wed, 27 May 2020 00:00:00 GMT</pubDate>
      <description>Useless bugs are just being given up too early.</description>
    </item>
    <item>
      <title>Two macOS Persistence Tricks Abusing Plugins</title>
      <link>https://codecolor.ist/posts/2019-11-21-two-macos-persistence-tricks-abusing-plugins/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2019-11-21-two-macos-persistence-tricks-abusing-plugins/</guid>
      <pubDate>Thu, 21 Nov 2019 00:00:00 GMT</pubDate>
      <description>Similar to DLL sideloading, legit plugins on macOS could be abused to load executable code on startup.</description>
    </item>
    <item>
      <title>Rootpipe Reborn (Part II): CVE-2019-8565 Feedback Assistant Race Condition</title>
      <link>https://codecolor.ist/posts/2019-04-21-rootpipe-reborn-part-ii/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2019-04-21-rootpipe-reborn-part-ii/</guid>
      <pubDate>Sun, 21 Apr 2019 00:00:00 GMT</pubDate>
      <description>Relying on pid to validate IPC peer is unsafe.</description>
    </item>
    <item>
      <title>Rootpipe Reborn (Part I): TimeMachine Command Injection</title>
      <link>https://codecolor.ist/posts/2019-04-13-rootpipe-reborn-part-i/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2019-04-13-rootpipe-reborn-part-i/</guid>
      <pubDate>Sat, 13 Apr 2019 00:00:00 GMT</pubDate>
      <description>Applying web security tricks to macOS LPE bugs.</description>
    </item>
    <item>
      <title>One-liner Safari Sandbox Escape Exploit</title>
      <link>https://codecolor.ist/posts/2019-03-26-one-liner-safari-sandbox-escape-exploit/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2019-03-26-one-liner-safari-sandbox-escape-exploit/</guid>
      <pubDate>Tue, 26 Mar 2019 00:00:00 GMT</pubDate>
      <description>TOCTOU bug in CoreFoundation and state change of sandbox lockdown on macOS Safari, leading to easy sandbox escape.</description>
    </item>
    <item>
      <title>CVE-2018-4991: Adobe Creative Cloud Desktop Local Privilege Escalation via Signature Bypass</title>
      <link>https://codecolor.ist/posts/2018-08-22-cve-2018-4991-adobe-creative-cloud-desktop-local-privilege-escalation-via-signature-bypass/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2018-08-22-cve-2018-4991-adobe-creative-cloud-desktop-local-privilege-escalation-via-signature-bypass/</guid>
      <pubDate>Wed, 22 Aug 2018 00:00:00 GMT</pubDate>
      <description>The private API design of XPC could make it hard for 3rd-party developers to write security code.</description>
    </item>
    <item>
      <title>CVE-2018-8412: MS Office 2016 for Mac Privilege Escalation via a Legacy Package</title>
      <link>https://codecolor.ist/posts/2018-08-22-cve-2018-8412-ms-office-2016-for-mac-privilege-escalation-via-a-legacy-package/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2018-08-22-cve-2018-8412-ms-office-2016-for-mac-privilege-escalation-via-a-legacy-package/</guid>
      <pubDate>Wed, 22 Aug 2018 00:00:00 GMT</pubDate>
      <description>Code signature bypass and insecure sideloading result in privilege escalation in Microsoft Office 2016 for Mac</description>
    </item>
    <item>
      <title>Something About #realworldctf doc2own</title>
      <link>https://codecolor.ist/posts/2018-08-07-something-about-realworldctf-doc2own/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2018-08-07-something-about-realworldctf-doc2own/</guid>
      <pubDate>Tue, 07 Aug 2018 00:00:00 GMT</pubDate>
      <description>Get some real life 0day by playing CTF challenges.</description>
    </item>
    <item>
      <title>Bypass macOS Rootless by Sandboxing</title>
      <link>https://codecolor.ist/posts/2018-06-18-bypass-macos-rootless-by-sandboxing/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2018-06-18-bypass-macos-rootless-by-sandboxing/</guid>
      <pubDate>Mon, 18 Jun 2018 00:00:00 GMT</pubDate>
      <description>Attacking the operating system by using its own security mechanism.</description>
    </item>
    <item>
      <title>Visual Studio Code silently Fixed a Remote Code Execution Vulnerability</title>
      <link>https://codecolor.ist/posts/2018-03-16-visual-studio-code-silently-fixed-a-remote-code-execution-vulnerability/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2018-03-16-visual-studio-code-silently-fixed-a-remote-code-execution-vulnerability/</guid>
      <pubDate>Fri, 16 Mar 2018 00:00:00 GMT</pubDate>
      <description>Better not leave inspectable Electron instances on production.</description>
    </item>
    <item>
      <title>Bypass PHP Safe Mode by Abusing SQLite3&apos;s FTS Tokenizer</title>
      <link>https://codecolor.ist/posts/2016-01-20-bypass-php-safe-mode-by-abusing-sqlite3-s-fts-tokenizer/</link>
      <guid isPermaLink="true">https://codecolor.ist/posts/2016-01-20-bypass-php-safe-mode-by-abusing-sqlite3-s-fts-tokenizer/</guid>
      <pubDate>Wed, 20 Jan 2016 00:00:00 GMT</pubDate>
      <description>Abuse SQLite&apos;s legit feature to turn arbitrary SQL queries into arbitrary code execution and pwn php</description>
    </item>
  </channel>
</rss>
