Name: Christian Kisutsa
Type: User
Company: eKRAAL Innovation Hub
Bio: I'm into DFIR, Network Security Monitoring, Malware analysis, Mobile Security & Human Interaction Device (HID) hacking.
Twitter: xtian_kisutsa
Location: Nairobi, Kenya
Blog: http://www.shadowinfosec.io
Christian Kisutsa's Projects
An IDA Toolkit for analyzing iOS kernelcaches.
This is a code to help one keep an Immutable history of all Linux commands types on a system
imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution
This program show you IMSI numbers of cellphones around you.
Provides In-memory compilation and reflective loading of C# apps for AV evasion.
incomplete exploit for CVE-2018-4150 (by cmwdotme) for devices without SMAP
Resource for developing infosec skills for OSCP
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).
Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. (Xposed Module)
Dev tools for probing IOKit
Just another IOKit class dumper
Exploit for CVE-2021-30807
Most usable tools for iOS penetration testing
Example showing how to build a standalone iOS executable using Xcode.
Install and debug iPhone apps from the command line, without using Xcode
GeoSn0w's majestic knowledge base for iOS 12 / iOS 13 Jailbreak Development.
iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file of the injected dylib dynamic library based on runtime. If you are interested in other programs of the author, please visit https://github.com/SecurityLife
📱 The ultimate list of iOS device models - Identify model for iPhone, iPad, iPod touch, ⌚️ Apple Watch and 🖥 Apple TV.
Useful resources for iOS hacking
SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some other interesting information
iOS 12-iOS 13 SDK including symbols for private frameworks.
Every iOS security guide
Share iOS system framework's symbol files. Useful for symbolicating iOS crash report.
Resources and writeups for studying & practicing iOS security