Skip to content

nachtmaar/vizasm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VizAsm

Description

VizAsm is a reverse-enineering-tool for Mach-O binaries (Mach and iOS). It is capable of reading the Objective-C and C method calls and performing a security audit. VizAsm comes with a few built-in filters that you can use but is also expandable with user written filters (easy to write with the help of the Filter Api).

The results of the security audit is visualized as a graph (viewable in Gephi) but can also be viewed as simple text.

VizAsm needs the help of the Hopper Disassembler to get the disassembly. You can either run it as script from Hopper or export the .asm file and run the analysis from the command line.

Documentation

If you want to see the whole documentation checkout the project and have a look at doc/_build/html/index.html

About

VizAsm has been created at the University of Marburg 2013 out of a software project in the Distributed Systems Group.

The idee came from my two advisers:

  1. Lars Baumgärtner
  2. Matthias Leinweber

which supported me during the whole project.

Features

  • Read Objective-C and C method calls
  • Automated security audit
  • Create method call graph
  • Extensible with user supplied filters
    • Filter Api
  • Commandline version
  • Integration into the Hopper Disassembler
    • Annotate method calls
    • Annotate intance variables
    • Annotate registers and stack

Supported architectures

  • x86
  • x86_64
  • arm (32 bit)

Requirements

About

Mach-O Reverse Engineering Tool

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published