-
-
Notifications
You must be signed in to change notification settings - Fork 153
Home
Welcome to the frida-ios-hook wiki!
[+] Latest version
https://github.com/noobpk/frida-ios-hook/releases
[+] Develop version
git clone -b dev https://github.com/noobpk/frida-ios-hook
1. cd frida-ios-hook/
2. pip3 install -r requirements.txt
3. python3 setup.py
4. cd frida-ios-hook
Application: Apple AppStore
Identifier: com.apple.appstore
Name: AppStore
- List All Devices
./ioshook --list-devices
- List The Installed apps
./ioshook --list-apps
- List Info of Apps on Itunes
./ioshook --list-appinfo
list()
- List All Scripts
./ioshook --list-scripts
- Show system log of device
./ioshook --logcat
- Get the shell of connect device
Start Iproxy
iproxy 2222 22
./ioshook --shell
- Dump decrypt IPA
Start Iproxy
iproxy 2222 22
./ioshook -p com.apple.appstore --dump
Or
./ioshook -n 'App Store' --dump
- Dump memory of Application
./ioshook -n 'App Store' --dump-memory --string
- HexByte Scan IPA
Scan
./ioshook --hexbyte-scan scan --file AppStore.ipa --pattern E103??AA????E0
Patch
./ioshook --hexbyte-scan scan --file AppStore.ipa --address 0x184dfc 1F2003D5 0x1
Json
./ioshook --hexbyte-scan json --file AppStore.ipa --task hexbytescan-tasks/task.json
- Static Analysis Application
./ioshook -n 'App Store' -m app-static
- Bypass Jailbreak Detection
./ioshook -p com.apple.appstore -m bypass-jb
- Bypass SSL Pinning
./ioshook -p com.apple.appstore -m bypass-ssl
- Intercept URLRequest in App
./ioshook -n 'App Store' -m i-url-req
- Intercept Crypto in App
./ioshook -p com.apple.appstore -m i-crypto
With windows you use the same options as Darwin / Linux but use the command python3 ioshook.py + options