leptos-null / inject_decryptLinks
Decrypt Mach-O executables using injection
☆20Updated 6 years ago
Alternatives and similar repositories for inject_decrypt
Users that are interested in inject_decrypt are comparing it to the libraries listed below
Sorting:
- ☆35Updated 5 years ago
- iOS devicetree utils☆11Updated 2 years ago
- MachO editor / disassembler. No internet, no os requirements, just need a browser ;)☆12Updated 6 years ago
- Transform any ARM macho executable to a dynamic library☆43Updated 9 months ago
- This project injects into Hopper Disassembler and exposes core functionality via a local server. It can be used to create automations/too…☆16Updated 4 years ago
- Header-only binarycookies parser.☆17Updated 2 weeks ago
- A free runtime modification library.☆26Updated 7 years ago
- Apple's Security framework☆16Updated 2 years ago
- ☆40Updated 10 months ago
- XPC and Friends (libxpc, launchd and soon xpc.framework)☆67Updated last year
- A very basic C Mach-O Header Dump tool written for practicing purposes. Works With x86 and x86_64 binaries☆38Updated 2 years ago
- SDK for building most of Apple's OpenSource projects they released on opensource.apple.com☆16Updated 7 years ago
- A simple nodejs server that acts as a keystore for Grandmaster.☆21Updated 5 years ago
- DYLD shared cache loader for Hopper☆36Updated 8 years ago
- OS X Platform for loading C function or Objective-C method hooks from plists.☆29Updated 9 years ago
- Utility to create tbd's off dylibs☆77Updated 5 years ago
- Guessed headers of non-public Apple SDK☆52Updated 4 months ago
- C Library for Apple Firmware (Amalgam)☆28Updated 3 years ago
- macOS kext for host_special_port(4) patch☆90Updated 2 years ago
- Transform any ARM macho executable to a dynamic library☆77Updated 3 years ago
- ☆20Updated 4 years ago
- experimental iOS debugger☆31Updated 5 years ago
- A command-line tool to apply or remove Apple Binary Protection from an application.☆50Updated 16 years ago
- Kdebug events and ktraces parser☆37Updated 7 months ago
- A library that enables dynamically rebinding symbols in Mach-O binaries running on Apple platforms☆37Updated last year
- Reverse engineered headers for Apples CoreSymbolication private framework; plus the set of test cases I used to validate it☆91Updated 11 years ago
- Having fun with Siguza's v0rtex kernel exploit☆40Updated 3 years ago
- Research on Apple's USB protocols☆30Updated 6 years ago
- ☆21Updated 10 years ago
- Accessing physical memory on iOS.☆52Updated 5 years ago