opa334 / xnuspy_syscall_logger
Log all syscalls executed by a process (iOS / checkra1n / xnuspy)
☆62Updated 2 years ago
Alternatives and similar repositories for xnuspy_syscall_logger:
Users that are interested in xnuspy_syscall_logger are comparing it to the libraries listed below
- Search running processes on iOS for instances of a given objc class.☆37Updated 2 weeks ago
- ☆47Updated 3 years ago
- iOS system call/Mach trap interception for checkra1n'able devices☆153Updated 3 years ago
- IDA loader to help with SEPROM reverse engineering.☆33Updated last month
- Modern Jailbreak Detection Demo☆35Updated this week
- IDA loader for SEP firmware with dyld cache support.☆55Updated 4 months ago
- Private headers & entitlements for daemons, frameworks, applications private frameworks and more for iOS 17.0 21A328☆19Updated last year
- Mapping physical memory to user space (EL0) on iOS.☆70Updated 2 years ago
- iOS 14 kernel exploit based on PhysPuppet☆57Updated 3 months ago
- A tool to call CoreTrust evaluation from userland☆16Updated 8 months ago
- Interact with trustcaches☆39Updated last year
- Kernel-based method to take screenshots on iOS, works with encrypted videos.☆61Updated 3 years ago
- Shortcut to automate your iproxy, debugserver, lldb workflow☆36Updated 2 months ago
- vnodebypass using hidePath of jelbrekLib(Jakeashacks) and maphys (0x7ff) + special thanks to akusio☆67Updated 2 years ago
- An iOS kernel debugger based on a KTRR bypass for A11 iPhones; works with LLDB and IDA Pro.☆55Updated 3 years ago
- Tool to patch the ASLR slide generation in the kernel to disable user-land ASLR on 32-bit iOS☆34Updated 4 years ago
- Tracing of iOS/macOS binaries using HW single step and Frida DBI☆73Updated last month
- CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)☆48Updated 2 years ago
- ☆67Updated 2 years ago
- Lightweight *OS hooking library with no dependencies except for libsystem☆62Updated 3 weeks ago
- Find some iBoot functions in an iBoot64.☆41Updated 3 years ago
- jtool2 support Mac arm64 and x86_64☆30Updated 2 years ago
- A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.☆16Updated 3 weeks ago
- an attempt to intercept syscalls for iOS applications that is unfinished and works only partially☆12Updated 4 years ago
- Transform any ARM macho executable to a dynamic library☆41Updated 2 years ago
- ☆23Updated 3 years ago
- Naville's HikariObfuscator for LLVM 12. Under active development. Use with caution.☆56Updated 2 years ago
- ☆69Updated 7 months ago
- Utilities to deploy frida on rootless iOS and more☆120Updated 4 months ago
- File detection bypass for iOS☆19Updated 3 years ago