Skip to content

Commit 516e539

Browse files
committed
News 22/02/2024 11:14 -> New release!!.
1 parent cf6b489 commit 516e539

File tree

7 files changed

+24
-4
lines changed

7 files changed

+24
-4
lines changed
-18.8 KB
Binary file not shown.

dist/wh1tem0cha-0.1.tar.gz

-19.5 KB
Binary file not shown.
20.1 KB
Binary file not shown.

dist/wh1tem0cha-0.2.tar.gz

21.1 KB
Binary file not shown.

setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
setuptools.setup(
77
name="wh1tem0cha",
8-
version="0.1",
8+
version="0.2",
99
author="CYB3RMX",
1010
author_email="cyb3rmx0@gmail.com",
1111
description="Python Module for Parsing & Reverse Engineering Mach-O Executables.",

src/wh1tem0cha.egg-info/PKG-INFO

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Metadata-Version: 2.1
22
Name: wh1tem0cha
3-
Version: 0.1
3+
Version: 0.2
44
Summary: Python Module for Parsing & Reverse Engineering Mach-O Executables.
55
Home-page: https://github.com/CYB3RMX/Wh1teM0cha
66
Author: CYB3RMX
@@ -15,7 +15,12 @@ License-File: LICENSE
1515

1616
# Wh1teM0cha
1717
<img src="https://img.shields.io/badge/-Python-black?style=for-the-badge&logo=python&logoColor=white">
18-
<br><b>Python Module for Parsing/Reverse Engineering Mach-O Executables.</b><br>
18+
<p align="center">
19+
<img src="https://github.com/CYB3RMX/Wh1teM0cha/assets/61325408/322d3083-cb78-4630-ae71-1ae33f5dc543" width="400" style="margin=auto;">
20+
<br>
21+
<br><b>Python Module for Parsing & Reverse Engineering Mach-O Executables.</b><br>
22+
</p>
23+
<br>
1924

2025
# Installation
2126
- <i>You can simply run this command.</i>

src/wh1tem0cha/wh1tem0cha.py

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -607,7 +607,7 @@ def get_dyld_info(self):
607607
except:
608608
raise Exception("No such load command -> LC_DYLD_INFO[_ONLY]")
609609

610-
def get_symtab(self):
610+
def get_symtab_info(self):
611611
"""
612612
Description: This method returns information about LC_SYMTAB
613613
Usage: wm.get_symtab()
@@ -641,6 +641,21 @@ def get_symtab(self):
641641
except:
642642
raise Exception("No such load command -> LC_SYMTAB")
643643

644+
def dump_symtab_strings(self):
645+
"""
646+
Description: This method returns string values contained in LC_SYMTAB
647+
Usage: wm.dump_symtab_strings()
648+
"""
649+
# We need to locate offset start of the symtab strings
650+
sym_inf = self.get_symtab_info()
651+
652+
# After that dump sizeof(symtab_strings_offset)
653+
self._fhandler.seek(int(sym_inf["stroff"], 16))
654+
buffer = self._fhandler.read(int(sym_inf["strsize"], 16))
655+
str_vals = re.findall(r"[^\x00-\x1F\x7F-\xFF]{4,}".encode(), buffer)
656+
657+
return str_vals
658+
644659
def get_binary_info(self):
645660
"""
646661
Description: This method is for getting general information about the target binary

0 commit comments

Comments
 (0)