evilpenguin / MachoDecryptLinks
Decrypt iOS binaries at runtime
☆93Updated 4 years ago
Alternatives and similar repositories for MachoDecrypt
Users that are interested in MachoDecrypt are comparing it to the libraries listed below
Sorting:
- Enabled Web Inspector for all iOS apps☆52Updated 3 years ago
- Log iOS network traffic without a proxy☆149Updated 2 years ago
- Sniff XPC goodies on your iOS device.☆91Updated 5 years ago
- tree but for Objective-C messages.☆125Updated last year
- Python script to SSH into your jailbroken device, decrypt an iOS App and transfer it to your local machine☆93Updated 6 years ago
- iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file of the i…☆87Updated 4 years ago
- ☆128Updated 5 months ago
- Grab your libboringssl keys to decrypt traffic (pcaps)☆62Updated 5 years ago
- Frida's finally getting Swifty☆146Updated 5 months ago
- Frida library for interacting with Swift programs. Superseded by https://github.com/frida/frida-swift-bridge☆100Updated 7 years ago
- class-dump binaries for Objc and Swift apps☆75Updated 7 years ago
- Transform any ARM macho executable to a dynamic library☆77Updated 3 years ago
- A utility for hiding jailbreak from iOS applications☆114Updated 3 years ago
- A modern Objective-C class dump based on LIEF and LLVM.☆164Updated last year
- Some frida scripts☆69Updated 11 months ago
- Jailbreak detection was changed through the years. This is a history overview and analysis of modern applications like Snapchat and Pokem…☆128Updated 2 years ago
- ☆16Updated 4 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆166Updated 5 years ago
- CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)☆48Updated 3 years ago
- Sniff XPC communication using Frida and Go☆151Updated 3 months ago
- iOS system call/Mach trap interception for checkra1n'able devices☆158Updated 4 years ago
- Detect whether iOS device is jailbroken or not | Jailbreak detection for iOS☆89Updated 3 years ago
- Proof-of-concept for CVE-2022-26766 on macOS 12.3.1☆87Updated 3 years ago
- Workaround for the 4 0-days: https://github.com/illusionofchaos/ios-gamed-0day https://github.com/illusionofchaos/ios-nehelper-wifi-info-…☆29Updated 4 years ago
- set HTTPS proxy from command line☆27Updated 6 years ago
- vnodebypass using hidePath of jelbrekLib(Jakeashacks) and maphys (0x7ff)☆29Updated 2 years ago
- A runtime ObjC class-dump☆77Updated 11 months ago
- call functions in a remote process using Mach API☆104Updated 8 months ago
- Patchfinder and rebinder for objc_direct methods☆60Updated last year
- iOS Reverse Tools☆43Updated 8 years ago