Rizin
unix-like reverse engineering framework and cli tools
ios-syscalls.py File Reference

Go to the source code of this file.

Namespaces

 ios-syscalls
 

Functions

def ios-syscalls.chk (x)
 

Variables

string ios-syscalls.dev_pid = "23f88587e12c30376f8ab0b05236798fdfa4e853/4903"
 
 ios-syscalls.rz = rzpipe.open("frida://" + dev_pid)
 
 ios-syscalls.funcs = rz.cmd("pdj 2 @@f:sym.fun.*")