FBLeee / frida_IOS_print_argsLinks
利用frida打印IOS中OC函数中各类型参数,初步总结
☆15Updated 2 years ago
Alternatives and similar repositories for frida_IOS_print_args
Users that are interested in frida_IOS_print_args are comparing it to the libraries listed below
Sorting:
- 一些iOS常用的frida脚本☆20Updated last year
- An Obfuscator for LLVM 19-20☆114Updated 2 months ago
- iOS地铁跑酷菜单。支持越狱/非越狱环境,自带static inline hook☆28Updated 2 weeks ago
- ios application class-dump use frida☆40Updated 2 years ago
- iOS Easy Hooking Library☆31Updated 3 years ago
- ☆41Updated 3 years ago
- tool that manually disable ptrace deny attach under kernel model☆18Updated 3 years ago
- Objective-C Trace Tools for iOS and macOS☆20Updated 6 years ago
- an iOS kernel function hooking framework for checkra1n'able devices☆22Updated last year
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆73Updated last year
- ☆49Updated 4 years ago
- tool that manually disable ptrace deny attach under kernel model☆87Updated 3 years ago
- a demo show how to dump lldb info to ida.☆43Updated 4 years ago
- iOS binary memory dump tool for iOS15+ (rootful, rootless)☆51Updated 2 years ago
- 根据IPAPatch修改的工程,方便分析iOSApp☆17Updated 10 months ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆17Updated last year
- hook MachO file based on Dobby (NOT DONE)☆45Updated 6 years ago
- Traces syscalls on iOS via Frida, including Mach syscalls.☆96Updated 3 months ago
- ☆18Updated 3 years ago
- Log all syscalls executed by a process (iOS / checkra1n / xnuspy)☆71Updated 3 years ago
- Modern Jailbreak Detection Demo☆90Updated last month
- 基于 Dopamine 无根越狱实现的插件,该插件可以通过使用 3D Touch 快速Debug 调试某个 App☆35Updated last year
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆27Updated 5 months ago
- An iOS developer framework for rootless tweak development.☆32Updated 2 years ago
- You can HIDE Doing jailbreak your iDevice.☆41Updated 5 years ago
- Support inspecting UIWebView/WKViewView for any process without debugging☆10Updated last year
- PoC showing a method to hide syscalls on XNU (arm64 macOS and iOS) from static analysis☆30Updated 3 years ago
- ☆55Updated 2 years ago
- 常用测试脚本☆24Updated 6 months ago
- A reverse engineering tool to restore stripped symbol table for iOS app.☆19Updated last year