Browser-based sysdiagnose analyzer for detecting exploitation indicators on iOS devices. No install, no dependencies -- drag and drop your sysdiagnose and get results.
Live tool: https://jgoyd.github.io/PARALLAX
- Generate a sysdiagnose on your iPhone:
- Settings > Privacy & Security > Analytics & Improvements > sysdiagnose
- Or hold Volume Up + Down + Power for 1.5 seconds
- Wait ~10 minutes, then find it in Analytics Data
- Open PARALLAX in any browser (or use the live link above)
- Drag and drop your sysdiagnose .tar.gz
- Review results
Runs entirely in your browser. No data leaves your machine.
PARALLAX scans sysdiagnose files for indicators across multiple exploitation layers: hardware/firmware manipulation, baseband redirection, persistence mechanisms, unauthorized data collection, and egress channels.
- AzulMalla -- BCM43xx coexistence SRAM vulnerability disclosure and
mesh_detect.pyCLI scanner - ZombieHunter -- iOS silicon implant detector (CVE-2026-20700 SSV persistence)