Linked by Thom Holwerda on Tue 17th Mar 2009 20:53 UTC
Mac OS X "A number of folks have asked me what tools and techniques I use to reverse engineer Cocoa executables. I thought it would be worth taking some time out from documenting undocumented APIs to show you how easy it is to do the same thing for yourself. [...] With all these tools in your arsenal, reverse engineering Cocoa executables is actually very simple. In fact, it's a good deal more straightforward than most Windows executables, with the exception of Delphi and .NET where - like Cocoa - a good deal of runtime type information is contained within the executable."
Permalink for comment 353635
To read all comments associated with this story, please click here.
Member since:

Looks intuitive and useful - if anyone was interested and hadn't read the comments on the article (specifically Paul Langlais' comment).

Reply Score: 3