obriensp / proto-dumpLinks
Recover Protobuf descriptors from executables
☆47Updated 11 years ago
Alternatives and similar repositories for proto-dump
Users that are interested in proto-dump are comparing it to the libraries listed below
Sorting:
- Mac OS X syscall hook kext☆22Updated 9 years ago
- Misc llvm patches☆23Updated 4 years ago
- A library to execute code in the context of other processes on iOS 11.☆82Updated 7 years ago
- Reexport symbols for Mach-O and ELF☆38Updated 7 years ago
- A macOS IOKit objects hooker☆88Updated 8 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆52Updated last month
- Experiment to attempt to build Apple's dyld tools.☆63Updated 5 years ago
- Unstripped iOS kernel extensions and more. More coming soon.☆59Updated 5 years ago
- iOS10~iOS13 Edition) Dump Kext information from iOS kernel cache. Applicable to the kernel which dump from memory. The disassembly framew…☆21Updated 3 years ago
- Apple SEP reverse☆52Updated 5 years ago
- A tiny macOS 10.12 Sierra kernel extension for disabling CS_REQUIRE_LV system-wide☆73Updated 8 years ago
- mirror of apple's corecrypto implementation☆36Updated 8 years ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes☆26Updated 5 years ago
- A tool for debugging macOS virtual machines☆112Updated 4 years ago
- macOS kext for host_special_port(4) patch☆89Updated last year
- ☆13Updated 5 years ago
- C Library for Apple Firmware (Amalgam)☆28Updated 3 years ago
- macOS Private KPI Symbol Resolver☆49Updated 8 years ago
- Cross Platform Hook Library based on Detours☆32Updated 9 months ago
- Tool for reverse-engineering Apple's sandbox☆58Updated 8 years ago
- Binary Format of iOS 13 Sandbox Profile Collection☆51Updated 5 years ago
- XNU kernel symbol resolver(kernel extension)☆12Updated 6 years ago
- Load a dynamic library and start a thread in another process☆27Updated 9 years ago
- A plugin for Binary Ninja containing tools for iOS reversing☆30Updated 7 years ago
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆19Updated 3 years ago
- Reverse engineered headers for Apples CoreSymbolication private framework; plus the set of test cases I used to validate it☆91Updated 11 years ago
- ☆16Updated 4 years ago
- Gives complete trace of a function execution including all sub-calls.☆112Updated last year
- call functions in a remote process using Mach API☆104Updated 4 months ago
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆81Updated last year