doronz88 / swift_reversingLinks
My ongoing primer on reversing Swift
☆108Updated 2 months ago
Alternatives and similar repositories for swift_reversing
Users that are interested in swift_reversing are comparing it to the libraries listed below
Sorting:
- A runtime ObjC class-dump☆77Updated 10 months ago
- ☆58Updated 2 months ago
- A modern Objective-C class dump based on LIEF and LLVM.☆163Updated last year
- Search running processes on iOS for instances of a given objc class.☆54Updated 10 months ago
- Yet another xpc sniffer☆132Updated 3 months ago
- Utilities to deploy frida on rootless iOS and more☆125Updated last year
- ☆49Updated 4 years ago
- Log all syscalls executed by a process (iOS / checkra1n / xnuspy)☆69Updated 3 years ago
- Naville's HikariObfuscator for LLVM 12. Under active development. Use with caution.☆55Updated 3 years ago
- PoC and technical details of CVE-2025-24204☆62Updated last month
- LLDB wrapped and empowered by iPython's features☆145Updated 3 weeks ago
- Traces syscalls on iOS via Frida, including Mach syscalls.☆82Updated 3 weeks ago
- Plugin to ease reversing iOS projects☆89Updated 2 weeks ago
- A tracer based on frida for XPC messages in iOS and macOS.☆35Updated 2 years ago
- IDA loader for SEP firmware with dyld cache support.☆58Updated last year
- Next-Generation Remote Analysis Suite for iOS.☆74Updated last month
- tree but for Objective-C messages.☆125Updated last year
- Tracing of iOS/macOS binaries using HW single step and Frida DBI☆82Updated 11 months ago
- Objective C classdump for IDA Pro☆148Updated 5 years ago
- Shortcut to automate your iproxy, debugserver, lldb workflow☆41Updated last year
- LLDB commands for iOS debugging and reverse engineering.☆29Updated last month
- Experimental improvements to Objective-C analysis for Binary Ninja☆44Updated 2 months ago
- Sniff XPC communication using Frida and Go☆151Updated 2 months ago
- Modern Jailbreak Detection Demo☆82Updated 6 months ago
- FridaSwiftDump a Frida tool for retriving the Swift Object info from an running app.☆87Updated 2 years ago
- iOS system call/Mach trap interception for checkra1n'able devices☆158Updated 4 years ago
- `ipsw` symbolication signatures☆74Updated this week
- capture ios device traffic without jailbreak / sip disable☆36Updated 3 years ago
- jtool2 support Mac arm64 and x86_64☆35Updated 2 years ago
- Transform any ARM macho executable to a dynamic library☆42Updated 7 months ago