PsychoBird / Capere
An Apple Silicon hooking library written in C
☆14Updated 3 years ago
Alternatives and similar repositories for Capere:
Users that are interested in Capere are comparing it to the libraries listed below
- Transform any ARM macho executable to a dynamic library☆41Updated 2 years ago
- Extract Binaries from Apple's DYLD Shared Cache☆18Updated last year
- Slides and resources for talks I've given☆15Updated 6 months ago
- symbol dumps of iOS shared caches☆32Updated 2 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆49Updated 2 months ago
- experimental iOS debugger☆26Updated 4 years ago
- ☆21Updated last year
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆19Updated 2 years ago
- A library that enables dynamically rebinding symbols in Mach-O binaries running on Apple platforms☆30Updated 4 months ago
- Objective-C runtime tracing tool☆41Updated last year
- An assistant for BinDiff☆24Updated last year
- Guessed headers of non-public Apple SDK☆25Updated last month
- ☆18Updated 3 years ago
- App sandbox escapes for macOS☆28Updated 4 years ago
- A runtime ObjC class-dump☆67Updated last month
- This project injects into Hopper Disassembler and exposes core functionality via a local server. It can be used to create automations/too…☆16Updated 3 years ago
- XPC sniffer using LLDB☆43Updated 3 months ago
- Apple runtime introspection tools☆20Updated 2 months ago
- arm64 and arm64e dylib injector☆30Updated 11 months ago
- capture ios device traffic without jailbreak / sip disable☆35Updated 2 years ago
- My collection of PoCs☆25Updated last year
- Hopper plugin to analyze ObjC runtime structures in the dyld_shared_cache☆24Updated 3 years ago
- slightly modified version of jonathan levins lsdtrip bin available at http://newosxbook.com/tools/lsdtrip.html☆16Updated 10 months ago
- Utility for sniffing SSL/TLS encrypted traffic on a darwin-based platforms.☆23Updated last year
- A free runtime modification library.☆24Updated 6 years ago
- Translate and patch arm64e binaries or macOS arm64 binaries to run on an arm64 iPhone at runtime.☆48Updated 2 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆10Updated 2 years ago
- ☆63Updated 4 months ago
- `ipsw` symbolication signatures☆54Updated 3 weeks ago
- ☆8Updated 2 years ago