Yet another xpc sniffer
git clone --recurse-submodules https://github.com/ChiChou/XpcScope.git
python3 -m venv .venv # initialize virtual environment
source .venv/bin/activate # active venv shell
pip install -e . # install all dependencies
frida-compile agent/src/index.ts -o agent/_agent.js # build frida agent
I am too lazy to adapt the cli options from frida, so simply write your attach logic in target.py
under current directory.
An example script is provided in target.example.py
With venv activated:
xpcscope target | wireshark -k -i -
Or if you have uv
uv run xpcscope target | wireshark -k -i -