Rizin
unix-like reverse engineering framework and cli tools
ios-syscalls Namespace Reference

Functions

def chk (x)
 

Variables

string dev_pid = "23f88587e12c30376f8ab0b05236798fdfa4e853/4903"
 
 rz = rzpipe.open("frida://" + dev_pid)
 
 funcs = rz.cmd("pdj 2 @@f:sym.fun.*")
 

Function Documentation

◆ chk()

def ios-syscalls.chk (   x)

Definition at line 6 of file ios-syscalls.py.

6 def chk(x):
7  if x[1]["opcode"] == "svc 0x80":
8  name = x[0]["flags"][0][8:]
9  sysnum = int(x[0]["opcode"].split(" ")[2], 16)
10  print("%d\t%s" % (sysnum, name))
11 
12 
def chk(x)
Definition: ios-syscalls.py:6
static int
Definition: sfsocketcall.h:114

References int.

Variable Documentation

◆ dev_pid

string ios-syscalls.dev_pid = "23f88587e12c30376f8ab0b05236798fdfa4e853/4903"

Definition at line 13 of file ios-syscalls.py.

◆ funcs

ios-syscalls.funcs = rz.cmd("pdj 2 @@f:sym.fun.*")

Definition at line 20 of file ios-syscalls.py.

◆ rz

ios-syscalls.rz = rzpipe.open("frida://" + dev_pid)

Definition at line 15 of file ios-syscalls.py.