IDA IDC script to improve Objective-C disassembly output
☆21Aug 30, 2012Updated 13 years ago
Alternatives and similar repositories for fixobjc
Users that are interested in fixobjc are comparing it to the libraries listed below
Sorting:
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Simplifies working with Objective-C binaries in IDA Pro☆184Jan 10, 2012Updated 14 years ago
- This is a repository for the code examples for the second edition of my book 'Hacking Electronics'.☆14Oct 16, 2017Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Aug 5, 2019Updated 6 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- ☆22Apr 16, 2017Updated 8 years ago
- DeviceAPI-iOS☆10Mar 5, 2020Updated 5 years ago
- playful-turtle USB gamepad firmware for the seeeduino xiao☆10Jul 19, 2023Updated 2 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- LLVM pass that detects one undefined behavior, and emits code to delete your hard drive☆35Aug 8, 2020Updated 5 years ago
- OS X Platform for loading C function or Objective-C method hooks from plists.☆29May 24, 2016Updated 9 years ago
- Google Project Zero OS X Vul Report Analysis☆32Apr 5, 2017Updated 8 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 2 weeks ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- RDFS: an erasure code based cloud storage system☆38Jul 28, 2014Updated 11 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- An IDA processor for eBPF bytecode☆34May 17, 2017Updated 8 years ago
- Mach-O & Universal Binary Parser☆148Nov 19, 2022Updated 3 years ago
- Slides, Papers, Links to CVEs and advisories☆77Oct 30, 2017Updated 8 years ago
- IDA Pro Scripts☆37Feb 24, 2015Updated 11 years ago
- An OSX exploitation helper library.☆35Nov 29, 2015Updated 10 years ago
- ☆68May 29, 2012Updated 13 years ago
- DMGExtractor, a Java application for extracting the contents of Mac OS X disk images. License: LGPLv3+☆53Oct 10, 2021Updated 4 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Linux ptrace anti-debugging demo☆40Aug 4, 2022Updated 3 years ago
- An UIWebViewController that mimics Safari☆26Nov 4, 2009Updated 16 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- ☆10May 12, 2022Updated 3 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Helps you create screenshots in multiple languages on different device types using UIAutomation.☆11Aug 11, 2022Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago