wh1tem0cha

Python Module for Parsing & Reverse Engineering Mach-O Executables.


Keywords
apple, cybersecurity, executable, ios, mach-o, macho-parser, macosx, malware-analysis, parser, python3, reverse-engineering
License
GPL-3.0
Install
pip install wh1tem0cha==0.3

Documentation

Wh1teM0cha



Python Module for Parsing & Reverse Engineering Mach-O Executables.


Installation

  • You can simply run this command.
pip3 install wh1tem0cha

How to Use

Note

This section contains brief information about the module. For more information please visit USECASES.md

General Information About Target Binary

  • Description: With this feature you can get general information from target MACH-O binary.
from wh1tem0cha import Wh1teM0cha

wm = Wh1teM0cha("target_binary_file")
wm.get_binary_info()

wm1

List Segments

  • Description: This method is for parsing and listing segments.
from wh1tem0cha import Wh1teM0cha

wm = Wh1teM0cha("target_binary_file")
wm.get_segments()

wm2

Get Target Segment Information

  • Description: With this method you can get additional information about the target segment.
from wh1tem0cha import Wh1teM0cha

wm = Wh1teM0cha("target_binary_file")
wm.segment_info("__TEXT")

wm3

List Sections

  • Description: This method is for parsing and listing sections.
from wh1tem0cha import Wh1teM0cha

wm = Wh1teM0cha("target_binary_file")
wm.get_sections()

wm4

Get Target Section Information

  • Description: With this method you can get additional information about the target section.
from wh1tem0cha import Wh1teM0cha

wm = Wh1teM0cha("target_binary_file")
wm.section_info("__text")

wm5