DavidGoldman / InspectiveC
objc_msgSend hook for debugging/inspection purposes.
☆718Updated 2 years ago
Alternatives and similar repositories for InspectiveC:
Users that are interested in InspectiveC are comparing it to the libraries listed below
- Class-dump any Mach-o file without extracting it from dyld_shared_cache☆595Updated 3 years ago
- Common hooking/monkey patching headers for Objective-C on Mac OS X and iPhone OS. MIT licensed☆678Updated 5 years ago
- Reveal Loader dynamically loads libReveal.dylib (Reveal.app support) into iOS apps on jailbroken devices.☆406Updated 8 years ago
- A reverse engineering tool to convert iOS app to dylib☆800Updated 7 years ago
- dylib injector for mach-o binaries☆967Updated 8 years ago
- Objc runtime additions.☆586Updated 11 years ago
- A reverse engineering tool to restore stripped symbol table for iOS app.☆1,319Updated 4 years ago
- One-step iOS binary runtime instrumentation for the lazy ones☆281Updated 5 years ago
- iOS 5.0/5.1/6.0/6.1/7.0/7.1/8.0/8.1 Headers of All Frameworks (private and not) + SpringBoard☆416Updated 9 years ago
- iOSOpenDev☆905Updated 11 months ago
- SwiftDump is a command-line tool for retriving the Swift Object info from Mach-O file.☆412Updated last year
- Simulate touch library for iOS☆513Updated 4 years ago
- Minimal for of saurik's ldid and prebuilt binary☆288Updated 12 years ago
- ☆650Updated 3 years ago
- A C/Objective-C library for parsing Mach-O files.☆549Updated 2 years ago
- A macOS utility to extract dynamic libraries from the dyld_shared_cache of macOS and iOS.☆223Updated last year
- 🍎Objective C Method Tracing Call Chart☆811Updated 3 years ago
- 🧱Explore MachO File on macOS and Windows☆597Updated 5 years ago
- A Hopper plugin for demangle Swift symbols☆558Updated 6 years ago
- Security profiling for blackbox iOS☆736Updated 8 years ago
- Command Line Tool for interacting with MachO binaries on OSX/iOS☆1,197Updated 5 years ago
- An implementation of function patching for iOS, without the use of W|X pages.☆269Updated 12 years ago
- Hook Objective-C blocks. A powerful AOP tool.☆849Updated last year
- This repository contains stuff which would be helpful for jailbroken iOS development.☆295Updated 9 years ago
- Trace Any Objective-C Method Calls☆255Updated last year
- Symbol obfuscator for iOS apps☆368Updated 11 months ago
- API to securely expose global services on jailbroken iOS☆237Updated 10 months ago
- A jailbreak iOS device tweak which can load FLEX dynamiclly☆226Updated 3 years ago
- symbol recreate tool for iOS app☆130Updated 8 years ago
- Quick Python script over otool to help spotting potentially unused methods in Objective-C Mach-O executable files☆454Updated 6 years ago