Skip to content

Instantly share code, notes, and snippets.

Avatar

Claud Xiao secmobi

View GitHub Profile
@nowa
nowa / iOS App Store Crawler
Created Aug 4, 2010
iOS App Store Crawler
View iOS App Store Crawler
#!/usr/bin/env ruby
# iOS App Store Crawler by Nowa <nowazhu@gmail.com>
# 2010-08-04
require 'rubygems'
require 'hpricot'
require 'open-uri'
USERAGENT = 'Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_4; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.99 Safari/533.4'
LETTERS = %w{A B C D E F G H I J K L M N O P Q R S T U V W X Y Z *}
@rwest
rwest / README
Created Jan 9, 2012 — forked from symposion/README
Convert OS X Keychain exported entries into logins for 1Password import
View README
These two files should help you to import passwords from mac OS X keychains to 1password.
Assumptions:
1) You have some experience with scripting/are a power-user. These scripts worked for me
but they haven't been extensively tested and if they don't work, you're on your own!
Please read this whole document before starting this process. If any of it seems
incomprehensible/frightening/over your head please do not use these scripts. You will
probably do something Very Bad and I wouldn't want that.
2) You have ruby 1.9.2 installed on your machine. This comes as standard with Lion, previous
versions of OS X may have earlier versions of ruby, which *may* work, but then again, they
@rsaunders100
rsaunders100 / AppReSigner.scpt
Created Mar 22, 2012
Re-sign .ipa files and replace the embedded.mobileprovision
View AppReSigner.scpt
-- Erica Sadun, http://ericasadun.com
-- iPhone Developer's Cookbook, 3.0 Edition
-- BSD License, Use at your own risk
-- Adapted by Rob Saunders to also replace embeded profiles
--
--
-- save in Script Editor as Application
-- drag files to its icon in Finder
@ericbroska
ericbroska / 0readme.md
Last active Dec 15, 2015
Code injection for CleanMyMac 2.0.2
View 0readme.md

How to build this up and inject in the app yourself?

Note: you must have an Xcode to do all that stuff.

$ git clone https://github.com/andymatuschak/Sparkle.git MySparkleForInjection
$ cd MySparkleForInjection
$ open SUAppcast.m
(sure, you can use any other file with «.m» extension in there)

@walkie
walkie / fslogger.c
Last active Jul 22, 2020
Patched version of Amit Singh's fslogger utility, which logs file system events in OS X.
View fslogger.c
/*
* fslogger.c
*
* A patched version of Amit Singh's fslogger utility, which logs file system
* events in OS X.
*
* This version fixes a small bug where four characters were missing from
* the beginning of each file path. It also eliminates a compiler warning.
*
* To compile:
@k3170makan
k3170makan / AndroidManifestFuzzer
Last active Oct 5, 2016
Nifty Little Bash Script for Fuzzing Application AndroidManifest.xml's
View AndroidManifestFuzzer
#!/bin/bash
#Basic set up for an Application AndroidManifest Fuzzer
#this requires a preexisting ant buildable application project to be set up! so get the SDK and ant1.8
#this file reproduces the bug mentioned here http://ibrahimbalic.com/2014/android-os-memory-corruption-bug/
#NOTE: values from 260000 and up cause SIGSEGvs to be sent to the system_server (test on KitKat 4.4.2)
#NOTE: you should probably monitor $(adb logcat)||(/system/bin/gdbserver) for responsiveness to the issue
APP_PROJ_DIR="..." #<-- PATH TO PROJ DIR
APP_PACKAGE_NAME="..." #<-- PACKAGE NAME
APP_LAUNCH_COMP="..." # <--- MAIN ACTIVITY NAME
@Fuzion24
Fuzion24 / MainActivity.java
Last active Aug 29, 2015
Nexus 5 Local DOS - Reboots Phone with zero permissions
View MainActivity.java
package com.nexus5.dos;
import android.content.Intent;
import android.support.v7.app.ActionBarActivity;
import android.os.Bundle;
import android.view.Menu;
import android.view.MenuItem;
import android.view.View;
import android.widget.Button;
public class MainActivity extends ActionBarActivity {
@steakknife
steakknife / ios-jailbroken-malware-scan.sh
Last active Aug 29, 2015
After reading the AppBuyer article...
View ios-jailbroken-malware-scan.sh
#!/usr/bin/env bash
set -e
YOUR_IPHONE=${1-root@172.20.10.1}
MALWARES='Unflod AdThief AppBuyer'
# folks say http://insanelyi.com/topic/17406-newly-discovered-ios-malware/
Unflod() { # aka SSLCreds
cat << PWND
/Library/MobileSubstrate/DynamicLibraries/Unflod.dylib
@sheagcraig
sheagcraig / AdwareCheckExtensionAttribute.py
Last active Dec 6, 2018
Check for Adware per Apple Kbase article
View AdwareCheckExtensionAttribute.py
#!/usr/bin/python
"""Identify or remove files known to be involved in Adware/Malware
infection.
Most of the code applies to building a list of malware files. Thus,
both extension attribute and removal handling are included.
Cleans files as a Casper script policy; thus, it expects four total
arguments, the first three of which it doesn't use, followed by
--remove
View README
These two files should help you to import passwords from mac OS X keychains to 1password.
Assumptions:
1) You have some experience with scripting/are a power-user. These scripts worked for me
but they haven't been extensively tested and if they don't work, you're on your own!
Please read this whole document before starting this process. If any of it seems
incomprehensible/frightening/over your head please do not use these scripts. You will
probably do something Very Bad and I wouldn't want that.
2) You have ruby 1.9.2 installed on your machine. This comes as standard with Lion, previous
versions of OS X may have earlier versions of ruby, which *may* work, but then again, they
You can’t perform that action at this time.