DavidGoldman / InspectiveC
objc_msgSend hook for debugging/inspection purposes.
☆715Updated last year
Related projects ⓘ
Alternatives and complementary repositories for InspectiveC
- A reverse engineering tool to convert iOS app to dylib☆786Updated 7 years ago
- dylib injector for mach-o binaries☆957Updated 8 years ago
- Class-dump any Mach-o file without extracting it from dyld_shared_cache☆590Updated 2 years ago
- Common hooking/monkey patching headers for Objective-C on Mac OS X and iPhone OS. MIT licensed☆677Updated 5 years ago
- One-step iOS binary runtime instrumentation for the lazy ones☆279Updated 5 years ago
- 🍎Objective C Method Tracing Call Chart☆806Updated 3 years ago
- Objc runtime additions.☆585Updated 11 years ago
- ☆650Updated 3 years ago
- A reverse engineering tool to restore stripped symbol table for iOS app.☆1,311Updated 4 years ago
- Reveal Loader dynamically loads libReveal.dylib (Reveal.app support) into iOS apps on jailbroken devices.☆406Updated 8 years ago
- 🧱Explore MachO File on macOS and Windows☆597Updated 5 years ago
- Command Line Tool for interacting with MachO binaries on OSX/iOS☆1,185Updated 5 years ago
- iOS 5.0/5.1/6.0/6.1/7.0/7.1/8.0/8.1 Headers of All Frameworks (private and not) + SpringBoard☆417Updated 9 years ago
- A macOS utility to extract dynamic libraries from the dyld_shared_cache of macOS and iOS.☆224Updated last year
- iOSOpenDev☆902Updated 7 months ago
- A C/Objective-C library for parsing Mach-O files.☆546Updated 2 years ago
- Minimal for of saurik's ldid and prebuilt binary☆288Updated 12 years ago
- A latest buildable and debuggable Objective-C runtime (objc4-818.2) project.☆537Updated 2 years ago
- SwiftDump is a command-line tool for retriving the Swift Object info from Mach-O file.☆400Updated last year
- An implementation of function patching for iOS, without the use of W|X pages.☆270Updated 11 years ago
- Simulate touch library for iOS☆511Updated 4 years ago
- Dumps decrypted mach-o files from encrypted applications、framework or app extensions.☆279Updated 6 years ago
- Quick Python script over otool to help spotting potentially unused methods in Objective-C Mach-O executable files☆453Updated 5 years ago
- A Hopper plugin for demangle Swift symbols☆546Updated 6 years ago
- Hook Objective-C blocks. A powerful AOP tool.☆844Updated 9 months ago
- This repository contains stuff which would be helpful for jailbroken iOS development.☆293Updated 9 years ago
- Security profiling for blackbox iOS☆730Updated 8 years ago
- Trace Any Objective-C Method Calls☆254Updated 8 months ago
- Symbol obfuscator for iOS apps☆365Updated 7 months ago
- Safe Method Swizzling.☆894Updated 5 years ago