knightsc / hopperLinks
A collection of Hopper plugins and scripts
☆27Updated 2 years ago
Alternatives and similar repositories for hopper
Users that are interested in hopper are comparing it to the libraries listed below
Sorting:
- arm64 and arm64e dylib injector☆36Updated last year
- XPC sniffer using LLDB☆46Updated 11 months ago
- dyld_shared_cache processing / Single-Image loading for BinaryNinja☆86Updated last year
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆78Updated last year
- Mach-O file parser.☆56Updated 4 months ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆52Updated 2 months ago
- Plugin to ease reversing iOS projects☆21Updated this week
- An assistant for BinDiff☆26Updated 2 years ago
- PCIDriverKit proof-of-concept for CVE-2022-26763☆38Updated 3 years ago
- ☆34Updated last month
- A RootKit for macOS that can perform kernel read/write, hook kernel and userspace functions, set custom conditional breakpoints, etc☆24Updated 3 years ago
- A general purpose toolkit to make vulnerability research on macOS easier.☆81Updated 6 months ago
- Experimental improvements to Objective-C analysis for Binary Ninja☆44Updated 2 weeks ago
- My collection of PoCs☆26Updated last year
- Exploit for CVE-2023-32364☆22Updated last year
- A Ghidra extension for reverse-engineering macOS binaries.☆19Updated 7 months ago
- WebKit/JSC CodeQL Databases☆17Updated 3 weeks ago
- ☆39Updated 4 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆31Updated 4 years ago
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆19Updated 3 years ago
- Host your own *OS Entitlement Database☆52Updated this week
- CVE-2022-46718: an app may be able to read sensitive location information.☆27Updated 2 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago
- Inlining functions in IDA HexRays using microcode. Abandoned due to official outline support in IDA v8.0☆16Updated 2 years ago
- `ipsw` symbolication signatures☆70Updated 3 weeks ago
- A simple macOS debugger detection trick☆15Updated 4 months ago
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆33Updated 6 years ago
- CVE-2020-27950 exploit☆34Updated 4 years ago
- A runtime ObjC class-dump☆77Updated 8 months ago
- Reverse engineering toolkit for Apple's wireless ecosystem☆75Updated 4 years ago