FBLeee / frida_IOS_print_argsLinks
利用frida打印IOS中OC函数中各类型参数,初步总结
☆12Updated 2 years ago
Alternatives and similar repositories for frida_IOS_print_args
Users that are interested in frida_IOS_print_args are comparing it to the libraries listed below
Sorting:
- iOS Easy Hooking Library☆26Updated 3 years ago
- An Obfuscator for LLVM 19-20☆53Updated last month
- tool that manually disable ptrace deny attach under kernel model☆18Updated 3 years ago
- ios application class-dump use frida☆38Updated 2 years ago
- an iOS kernel function hooking framework for checkra1n'able devices☆22Updated last year
- ☆47Updated 4 years ago
- 一些iOS常用的frida脚本☆17Updated 9 months ago
- Log all syscalls executed by a process (iOS / checkra1n / xnuspy)☆67Updated 3 years ago
- hook MachO file based on Dobby (NOT DONE)☆45Updated 5 years ago
- a demo show how to dump lldb info to ida.☆42Updated 3 years ago
- ☆31Updated 2 years ago
- Objective-C Trace Tools for iOS and macOS☆19Updated 5 years ago
- Modern Jailbreak Detection Demo☆77Updated 4 months ago
- 根据IPAPatch修改的工程,方便分析iOSApp☆15Updated 5 months ago
- Arm64 inline hooking for iOS, Android, OSX, and Linux.☆70Updated 10 months ago
- An iOS developer framework for rootless tweak development.☆32Updated last year
- Traces syscalls on iOS via Frida, including Mach syscalls☆77Updated last year
- tool that manually disable ptrace deny attach under kernel model☆85Updated 3 years ago
- iOS binary memory dump tool for iOS15+ (rootful, rootless)☆41Updated last year
- ☆25Updated 2 months ago
- Code to extracts stable ARM CPU register values directly from system hardware for fingerprinting device.☆26Updated last month
- 基于 Dopamine 无根越狱实现的插件,该插件可以通过使用 3D Touch 快速Debug 调试某个 App☆35Updated 11 months ago
- You can HIDE Doing jailbreak your iDevice.☆38Updated 4 years ago
- Search running processes on iOS for instances of a given objc class.☆51Updated 7 months ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆16Updated last year
- ☆18Updated 3 years ago
- What is Frida,Why is Frida, How about Frida☆45Updated 8 months ago
- vnodebypass using hidePath of jelbrekLib(Jakeashacks) and maphys (0x7ff) + special thanks to akusio☆77Updated 3 years ago
- A reverse engineering tool to restore stripped symbol table for iOS app.☆17Updated 8 months ago
- shell, python, Frida js scripts, and so on.☆19Updated 2 years ago