There are no reviews yet. Be the first to send feedback to the community and the maintainers!
_____ _ _____ | __ |___ ___ _| | |___ _____ | -| -_| .'| . | | | | -_| | |__|__|___|__,|___|_|_|_|___|_|_|_| A small userland util to dump processes memory Useful to dump stuff or verify stuff without gdb or running under gdb (c) fG! - 2012, 2013 - [email protected] - http://reverse.put.as This is a small and simple userland util to dump processes memory on the screen or to a binary file. Useful to dump stuff or verify something without gdb or running under gdb. A new option as been added as of version 0.3 that will dump the mach-o app or lib that is located at the given address. This makes process dumping easier (dumped binaries will not work because objective-c related stuff!), especially in iOS where there is no vmmap utility by default. With this, you can dump the main binary or any of its loaded libraries. You need to find the start address, which usually can be done using "info shared" command inside gdb. To use this feature, pass the -f option to the util (no need to specify the size in this case). Usage: readmem -p XXX -a ADDRESS -o WHATEVERNAMEYOUWANT -f It is compatible with Mac OS X and iOS. If you want to compile to iOS you need to modify the project target and add the below information to Xcode configurations. They will allow to build command-line executables for iOS. Don't forget that you need to give procmod permissions to the OS X version and the correct entitlements to the iOS version. For a good reference regarding entitlements go to http://246tnt.com/iPhone/. Nothing fancy to be seen here :-) Version 0.5 introduces code to locate and dump main binary of a given PID. No need anymore to input start address. fG! [email protected] Changes to iPhoneOSPackageTypes.xcspec: // Mach-O executable { Type = PackageType; Identifier = com.apple.package-type.mach-o-executable; Name = "Mach-O Executable"; Description = "Mach-O executable"; DefaultBuildSettings = { EXECUTABLE_PREFIX = ""; EXECUTABLE_SUFFIX = ""; EXECUTABLE_NAME = "$(EXECUTABLE_PREFIX)$(PRODUCT_NAME)$(EXECUTABLE_VARIANT_SUFFIX)$(EXECUTABLE_SUFFIX)"; EXECUTABLE_PATH = "$(EXECUTABLE_NAME)"; }; ProductReference = { FileType = compiled.mach-o.executable; Name = "$(EXECUTABLE_NAME)"; IsLaunchable = YES; }; }, Changes to iPhoneOSProductTypes.xcspec: // Tool (normal Unix command-line executable) { Type = ProductType; Identifier = com.apple.product-type.tool; Class = PBXToolProductType; Name = "Command-line Tool"; Description = "Standalone command-line tool"; IconNamePrefix = "TargetExecutable"; DefaultTargetName = "Command-line Tool"; DefaultBuildProperties = { FULL_PRODUCT_NAME = "$(EXECUTABLE_NAME)"; EXECUTABLE_PREFIX = ""; EXECUTABLE_SUFFIX = ""; REZ_EXECUTABLE = YES; INSTALL_PATH = "/usr/local/bin"; FRAMEWORK_FLAG_PREFIX = "-framework"; LIBRARY_FLAG_PREFIX = "-l"; LIBRARY_FLAG_NOSPACE = YES; GCC_DYNAMIC_NO_PIC = NO; GCC_SYMBOLS_PRIVATE_EXTERN = YES; GCC_INLINES_ARE_PRIVATE_EXTERN = YES; STRIP_STYLE = "all"; CODE_SIGNING_ALLOWED = YES; }; PackageTypes = ( com.apple.package-type.mach-o-executable // default ); },
MachOView
MachOView forkGdbinit
Gdbinit for OS X, iOS and others - x86, x86_64 and ARMlldbinit
A gdbinit clone for LLDBfirmware_vault
A repo for all Apple EFI firmware filesonyx-the-black-cat
Kernel extension to disable anti-debug tricks and other useful XNU "features"rootfool
A small tool to dynamically disable and enable SIP in El CapitanEFISwissKnife
An IDA plugin to improve (U)EFI reversingHexRaysDeob
Hex-Rays OLLVM Deobfuscator and MicroCode Explorerhydra
A kernel extension and userland daemon to patch applicationsotool-ng
Some improvements to Apple's otool.gopher
A OS X crypto ransomware PoCmach_race
Exploit code for CVE-2016-1757efi_dxe_emulator
EFI DXE Emulator and Interactive Debuggerpydbg64
PyDBG64 - OS X PyDbg with 64 bits supportosx_boubou
A PoC Mach-O infector via library injectionmpress_dumper
MPRESS dumper for OS Xgimmedebugah
A small utility to inject a Info.plist into binaries.gdb-ng
Apple's gdb fork with some fixes and enhancementsExtractMachO
IDA plugin to extract Mach-O binaries located in the disassembly or dataGatekeerper
A kernel extension to mitigate Gatekeeper bypasseskextstat_aslr
Implementation of kexstat via /dev/kmem with kernel ASLR supportcan_I_suid
A TrustedBSD module to control execution of binaries with suid bit setcrackme_nr1
fG!'s crackme #1 source codebruteforcesysent
Small util to discover OS X sysent via bruteforcetcplognke
Apple's tcplognke code sampleTELoader
A TE executable format loader for IDAunicorn_string_deobfuscator
A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscationmario
The kernel component of rootpipe fix for Mavericksadium-ng-preview
Repo to dump some preview info and builds for adium-ngMicrocodeExplorer
Hex-Rays MicrocodeExplorerreadkmem
small utility to dump kernel memoryrex_versus_the_romans
Anti Hacking Team TrustedBSD modulereadphysmem
A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.llvmpatches
Misc llvm patcheshello_santa_bye_santa
Bypass Google's Santafixobjc
IDA IDC script to improve Objective-C disassembly outputcheckidt
Small util to dump the IDT table of a running OS X system with kmem enabledarmorysandbox
A USB armory based USB sandboxMachOPlugin
IDA plugin to Display Mach-O headersicetheguardianv2
A TrustedBSD module PoC to monitor writes to Daemons and Agents foldersdiagnostic_service
OS X rootkit loader version #1kgmacros
Fixed kgmacros to work with VMware kernel gdb stubExtractMacho2
IDA plugin to extract Mach-O binaries located in the disassembly or datasyscall-benchmark
macOS syscall performance benchmarkav-monster
PoC kext to disable OS X anti-virus softwareluigi
The userland component of rootpipe fix for Maverickscarbon_copy_cloner_keychaingen
A keygen for Carbon Copy Cloner private keychainCrisis-Analysis-Tools
Scripts and other material related to OS.X/Crisis malware analysisdiagnostic_service2
OS X rootkit loader version #2calcspace
Small util to calculate available free space in mach-o binaries for code injectionidc-scripts
Random collection of IDA's IDC scriptsDisable-m3u
iTunes plugin to disable creation of m3u playlistsrexthewonderdog
A lazy PoC for implementing backdoors in OS X TrustedBSD Mac framework.fuckyouilfak
A IDA Pro 9.0 Beta 2 macOS x86 Fix Loaderdelambert
GreenLambert macOS IDA plugin to deobfuscate stringsGiveMeHex
A quick IDA hack to get addresses with 0x prefixtwitterwipe
A Go utillty to delete your Twitter historyhow_crap_is_ida
An IDA plugin to compare IDA detected functions output versus LC_FUNCTION_STARTS informationevilquest_stats
Small utility to hash EvilQuest code and cstrings sectionskeygen_CrackMe_nr1_qwertyoruiop
Keygen for qwertyoruiop's CrackMe nr1spiflash
Very fast reader for SPI flashes for Teensy 2.x.bpf_dbg_output
Small tool to convert bpf binary bytecode to bpf_dbg formatevilquest_deobfuscator
EvilQuest/ThiefQuest malware strings decrypter/deobfuscatoricetheguardian
A PoC to protect critical OS X files using TrustedBSD Mac framework.SMBIOSKeygen
macserial and GenSMBIOS merged and ported to Goyage
An age fork with internal Yubikeys supportsnake_queue_parser
A decryptor for Snake/Turla configuration filesMach-O-Lib
Library to access and manipulate Mach-O headersmacserial
macserial Go moduleLove Open Source and this site? Check out how you can help us