Murphy
Murphy
I've tried to replicate the Android analysis of the application escrackme.apk as it's described here: https://www.nowsecure.com/blog/2021/03/10/how-to-perform-symbolic-execution-of-mobile-apps-with-r2frida-esilsolve/ However, after install the application and force the odex generation, it is not possible...
There's only support for "read", "write", and "exit" syscalls. Increase the support for iOS and Android systems.
Allow to do the following: ``` :db objc:classname.methodname ```
Add a new command to enable/disable breakpoints already set.
Update `r2pipe.d.ts` documentation.
The command is stalled. The same ocurrs for demo_bruteforce.py in case of bruteforcing the pin.
(Murphy’s iPhone-data) / keychain /tmp/keychain-2.db Traceback (most recent call last): File "python_scripts/ios_examiner.py", line 449, in main() File "python_scripts/ios_examiner.py", line 446, in main ExaminerShell(image).cmdloop("") File "/usr/local/Cellar/python/2.7.8_2/Frameworks/Python.framework/Versions/2.7/lib/python2.7/cmd.py", line 142, in cmdloop stop...