RedMapleTech / machodump
Golang tool to dump useful information from a Mach-O binary
☆35Updated 11 months ago
Related projects: ⓘ
- Swift implementation of in-memory Mach-O loading on macOS☆61Updated 2 years ago
- Enabled Web Inspector for all iOS apps☆49Updated 2 years ago
- arm64 and arm64e dylib injector☆27Updated 7 months ago
- Sniff XPC communication using Frida and Go☆115Updated last week
- ☆39Updated 2 months ago
- Redirect spawned iOS application stdout and stderr to pty☆24Updated 8 months ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆69Updated 5 months ago
- ☆88Updated last year
- Enumerate running processes using com.apple.CodeSigningHelper☆13Updated 5 months ago
- Decrypt iOS binaries at runtime☆69Updated 2 years ago
- A runtime ObjC class-dump☆42Updated 3 months ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆28Updated 3 weeks ago
- Hopper plugin to analyze ObjC runtime structures in the dyld_shared_cache☆22Updated 3 years ago
- ☆28Updated 3 months ago
- An Apple Silicon hooking library written in C☆13Updated 3 years ago
- macOS RootKit that can fuzz binaries/drivers, do kernel r/w, hook kernel and userspace functions, set custom breakpoints, GDB stub (in pr…☆70Updated 5 months ago
- My collection of PoCs☆24Updated 10 months ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆37Updated 3 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆71Updated last year
- Swift code to programmatically perform dylib injection☆49Updated last year
- CVE-2020–9934 POC☆20Updated 4 years ago
- Mickey's Blogs☆17Updated this week
- Yet another xpc sniffer☆115Updated this week
- ☆54Updated last year
- Discover which process execute a hunted binary inside macOS☆24Updated 2 years ago
- Secure example of an XPC helper written in Swift☆99Updated 4 years ago
- The code repository for the Snake&Apple article series.☆69Updated this week
- One-Click to Completely Take Over A macOS Device☆17Updated 2 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆9Updated 2 years ago
- dyld_shared_cache processing / Single-Image loading for BinaryNinja☆81Updated 9 months ago