frida-ios-hook
flexdecrypt
Our great sponsors
frida-ios-hook | flexdecrypt | |
---|---|---|
2 | 7 | |
809 | 628 | |
- | - | |
4.5 | 0.0 | |
4 months ago | 10 months ago | |
JavaScript | Swift | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
frida-ios-hook
-
Frida iOS tips
I'm currently working on an iOS app to replicate a signature which looks to be generated with a MD5 hash. I'm currently using Frida, but haven't had any luck replicating it. I've used the script to hook on to general crypto functions, but nothing MD5 related seems to go on here. I've also hooked onto the CC_MD5 function, but it isn't displaying me the correct hash, so I'm guessing the app is using another library. I've had success with Android, as I can 1) see the source code with Jadx 2) Easily hook onto the MD5 class.
-
iOS Reverse Engineering
https://github.com/noobpk/frida-ios-hook <--This one has been the most useful
flexdecrypt
-
Decrypt IPA
Use flex decrypt ipa. https://github.com/JohnCoates/flexdecrypt or tool bfdecrypt from sileo or cydia
-
[Question] If I jailbreak do I still have to deal with all the bs that comes along with sideloading (3 app limit, blacklisting, apps expire after seven days, revokes, etc) ?
decrypted are easily changeable apps and stripped of apple id connections, u can find some at https://armconverter.com/decryptedappstore/us or use this tool https://github.com/JohnCoates/flexdecrypt
- Can TrollStore ldid be used to sign ios binaries or just IPA?
- [question] how do I decrypt the binary of apps on my jailbroken phone so I can upload them to a computer then transfer to a non jailbroken phone?
-
Modern approach to dumping headers?
what you wanna do is decrypt Snapchat through flexdecrypt then dump the classes from that decrypted binary using classdump (or assdump lol) it should output a huge header file
-
[Question] How will the jailed version of Supercharge supply iPA files
Supercharge fetches the iPA through something like ipatool(https://github.com/majd/ipatool) and decrypts it through something like flexdecrypt(https://github.com/JohnCoates/flexdecrypt). In my opinion this is among the best solutions though it may require a lot of work get an implementation working. I tried to implement this on a piece of code I worked on, but flexdecrypt turned out to be too unreliable for the purpose - it would often simply fail to decrypt certain binaries.
-
iOS Reverse Engineering
2 - https://github.com/JohnCoates/flexdecrypt
What are some alternatives?
frida-il2cpp-bridge - A Frida module to dump, trace or hijack any Il2Cpp application at runtime, without needing the global-metadata.dat file.
ipatool - Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
frida-scripts - A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
ktool - pip install k2l | Mach-O + Obj-C analysis TUI / CLI kit and library. Zero compiled deps, runs anywhere with a python interpreter.
awesome-frida - Awesome Frida - A curated list of Frida resources http://www.frida.re/ (https://github.com/frida/frida)
frida - Clone this repo to build Frida
React Lifecycle Visualizer - Real-time visualizer for React lifecycle methods
class-dump - Generate Objective-C headers from Mach-O files.
frida-ios-dump - pull decrypted ipa from jailbreak device
classdump-dyld - Class-dump any Mach-o file without extracting it from dyld_shared_cache