Skip to content

Commit

Permalink
News 22/02/2024 11:14 -> New release!!.
Browse files Browse the repository at this point in the history
  • Loading branch information
CYB3RMX committed Feb 22, 2024
1 parent cf6b489 commit 516e539
Show file tree
Hide file tree
Showing 7 changed files with 24 additions and 4 deletions.
Binary file removed dist/wh1tem0cha-0.1-py3-none-any.whl
Binary file not shown.
Binary file removed dist/wh1tem0cha-0.1.tar.gz
Binary file not shown.
Binary file added dist/wh1tem0cha-0.2-py3-none-any.whl
Binary file not shown.
Binary file added dist/wh1tem0cha-0.2.tar.gz
Binary file not shown.
2 changes: 1 addition & 1 deletion setup.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

setuptools.setup(
name="wh1tem0cha",
version="0.1",
version="0.2",
author="CYB3RMX",
author_email="[email protected]",
description="Python Module for Parsing & Reverse Engineering Mach-O Executables.",
Expand Down
9 changes: 7 additions & 2 deletions src/wh1tem0cha.egg-info/PKG-INFO
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
Metadata-Version: 2.1
Name: wh1tem0cha
Version: 0.1
Version: 0.2
Summary: Python Module for Parsing & Reverse Engineering Mach-O Executables.
Home-page: https://github.com/CYB3RMX/Wh1teM0cha
Author: CYB3RMX
Expand All @@ -15,7 +15,12 @@ License-File: LICENSE

# Wh1teM0cha
<img src="https://img.shields.io/badge/-Python-black?style=for-the-badge&logo=python&logoColor=white">
<br><b>Python Module for Parsing/Reverse Engineering Mach-O Executables.</b><br>
<p align="center">
<img src="https://github.com/CYB3RMX/Wh1teM0cha/assets/61325408/322d3083-cb78-4630-ae71-1ae33f5dc543" width="400" style="margin=auto;">
<br>
<br><b>Python Module for Parsing & Reverse Engineering Mach-O Executables.</b><br>
</p>
<br>

# Installation
- <i>You can simply run this command.</i>
Expand Down
17 changes: 16 additions & 1 deletion src/wh1tem0cha/wh1tem0cha.py
Original file line number Diff line number Diff line change
Expand Up @@ -607,7 +607,7 @@ def get_dyld_info(self):
except:
raise Exception("No such load command -> LC_DYLD_INFO[_ONLY]")

def get_symtab(self):
def get_symtab_info(self):
"""
Description: This method returns information about LC_SYMTAB
Usage: wm.get_symtab()
Expand Down Expand Up @@ -641,6 +641,21 @@ def get_symtab(self):
except:
raise Exception("No such load command -> LC_SYMTAB")

def dump_symtab_strings(self):
"""
Description: This method returns string values contained in LC_SYMTAB
Usage: wm.dump_symtab_strings()
"""
# We need to locate offset start of the symtab strings
sym_inf = self.get_symtab_info()

# After that dump sizeof(symtab_strings_offset)
self._fhandler.seek(int(sym_inf["stroff"], 16))
buffer = self._fhandler.read(int(sym_inf["strsize"], 16))
str_vals = re.findall(r"[^\x00-\x1F\x7F-\xFF]{4,}".encode(), buffer)

return str_vals

def get_binary_info(self):
"""
Description: This method is for getting general information about the target binary
Expand Down

0 comments on commit 516e539

Please sign in to comment.