load without any analysis (file header at offset 0x0): r2 -n /path/to/file
- analyze all:
aa - show sections:
iS - list functions:
afl - list imports:
ii - list entrypoints:
ie - seek to function:
s sym.main
| #! /usr/local/bin/python3 | |
| import os, shutil, time | |
| import binascii | |
| os.system("killall AltServer") | |
| print ('Please choose jailbreak you want to install') | |
| print ('1. Unc0ver\n2. Chimera\n3. Pangu\n4. Phoenix\n5. Home Depot\n6. h3lix\n') | |
| jailbreak = input("") |
| #!/usr/bin/env python | |
| import lief | |
| shellx = lief.parse("libshellx-2.10.3.1.so") | |
| # .dynsym | |
| dt_symtab = shellx[lief.ELF.DYNAMIC_TAGS.SYMTAB] | |
| dynsym_section = shellx.get_section(".dynsym") |
| // Taken from the commercial iOS PDF framework http://pspdfkit.com. | |
| // Copyright (c) 2014 Peter Steinberger, PSPDFKit GmbH. All rights reserved. | |
| // Licensed under MIT (http://opensource.org/licenses/MIT) | |
| // | |
| // You should only use this in debug builds. It doesn't use private API, but I wouldn't ship it. | |
| // PLEASE DUPE rdar://27192338 (https://openradar.appspot.com/27192338) if you would like to see this in UIKit. | |
| #import <objc/runtime.h> | |
| #import <objc/message.h> |