Advanced Apple Debugging & Reverse Engineering, Chapter 31
Por um escritor misterioso
Descrição
In this chapter, you'll use DTrace to hook objc_msgSend's entry probe and pull out the class name along with the Objective-C selector for that class. By the end of this chapter, you'll have LLDB generating a DTrace script which only generates tracing info for code implemented within the main executable that calls objc_msgSend.

Reverse Engineering: Binary Security, by Totally_Not_A_Haxxer

Reverse Engineering: Binary Security, by Totally_Not_A_Haxxer

The missing guide to debug third party apps on iOS 12+, by Felipe Cavalcanti

Red Canary Mac Monitor - An Advanced, Stand-Alone System Monitoring Tool Tailor-Made For macOS Security Research

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Advanced Apple Debugging & Reverse Engineering, Chapter 1: Getting Started

iOS Reverse Engineering - Debugging and Tracing with LLDB

Mastering Malware Analysis

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation: 9781118787311: Computer Science Books @

LLDB's Runtime Manipulation: A Guide to Advance Debugging and Optimization

Tampering and Reverse Engineering on iOS - OWASP MASTG

Kodeco Learn iOS, Android & Flutter

Advanced Apple Debugging & Reverse Engineering, Chapter 1: Getting Started

How to Reverse Engineer and Patch an iOS Application for Beginners: Part I
de
por adulto (o preço varia de acordo com o tamanho do grupo)