smx-smx / ezinjectLinks
Modular binary injection framework, successor of libhooker
☆95Updated last month
Alternatives and similar repositories for ezinject
Users that are interested in ezinject are comparing it to the libraries listed below
Sorting:
- Ghidra's IDA like experience by @NyaMisty☆43Updated 2 years ago
- Binary View plugin for reverse engineering iBoot like binaries with Binary Ninja☆55Updated last year
- Cross Platform Hook Library based on Detours☆32Updated 9 months ago
- Lightweight toolkit to explore and modify address translation for ARM64.☆43Updated 3 years ago
- extract various firmware blobs from iBoot☆45Updated 4 years ago
- A IDA plugin to show ARM MSRs nicely☆84Updated 2 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆52Updated 3 weeks ago
- Calltree generator for Binary Ninja☆45Updated 3 months ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago
- ☆39Updated 4 years ago
- dyld_shared_cache processing / Single-Image loading for BinaryNinja☆85Updated last year
- Unstripped iOS kernel extensions and more. More coming soon.☆57Updated 5 years ago
- IDA plugin to find code cross references to virtual functions using PAC codes☆145Updated 3 years ago
- LZVN compression/decompression tool☆15Updated 4 years ago
- Fork of PongoOS which can be run in QEMU☆66Updated 4 years ago
- Shortcut to automate your iproxy, debugserver, lldb workflow☆39Updated 8 months ago
- An IDAPython module for enhancing c++ support on top of ida_kernelcache☆136Updated 2 months ago
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆67Updated 4 years ago
- `ipsw` symbolication signatures☆66Updated last month
- arm64 and arm64e dylib injector☆36Updated last year
- call functions in a remote process using Mach API☆104Updated 3 months ago
- xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities. This is an easy way to practice…☆56Updated 4 years ago
- A tool to pull C++ object names from kernel memory☆16Updated 3 years ago
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆81Updated last year
- Tracing of iOS/macOS binaries using HW single step and Frida DBI☆81Updated 7 months ago
- Experimentation environment for checkm8-vulnerable devices☆54Updated last year
- use https://github.com/argp/iBoot64helper which is the orginal repo and far more advanced☆34Updated 5 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆82Updated 3 years ago
- Aarch64 architecture plugin☆85Updated last year
- A fork of Hikari's core obfuscation☆72Updated 4 years ago