Sick Codes maintains a number of large Open Source security tools. Visit our GitHub for all source or hard fork maintained repositories.

181 repositories, 865 followers. – Run Mac in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X! – Mac Serial Generator – Generate complete sets of Serial Numbers for OSX-KVM, Docker-OSX and of course, OpenCore. – Docker Android – Run QEMU Android in a Docker! X11 Forwarding! CI/CD for Android! – Run iPhone (xnu-arm64) in a Docker container! Supports KVM + iOS kernel debugging (GDB)! Run xnu-qemu-arm64 in Docker! Works on ANY device. – OSX Optimizer: Optimize MacOS – Shell scripts to speed up your mac boot time, accelerate loading, and prevent unnecessary throttling. – Collection of CVEs from Sick Codes, or collaborations on security research & advisories. – QNX FileSystem Kernel Modules OOT (qnx-modules-dkms) – Next Generation Android x86 Desktop – Anbox, Lineage, WayDroid, BlissOS,

Dock-Droid – Signed message regarding ownership & use of autodiscover domains:,,,,,,,,,,,,,, – Android NDK Extractor – Extract ARM native bridge libndk translation libraries for use in any Android derivative. – ADB Download All Files – A dirty shell script to adb pull all readable files using adb pull & base64 – No Sandbox – Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are already sandboxed escaped: – GUI for command-line X11 automation tool