|
|
Message-ID: <CACS-ydN8PzrXjx6OPVz1oGDe1Kj3Os3CWDnJ-=2QLbMvoc-qjg@mail.gmail.com> Date: Fri, 15 May 2026 21:21:47 +0100 From: Stuart Thomas <stuartpaulthomas@...il.com> To: oss-security@...ts.openwall.com Subject: Poppy: XPC Observability & Fault Injection Poppy: XPC Observability & Fault Injection Dynamic analysis toolkit for macOS daemons. Trace XPC messages, map entitlement checks in real-time, and perform targeted fault injection via Frida and DTrace. https://github.com/jetnoir/poppy
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.