Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers. Learn more at telco.re.
This is the recommended way to get started. All you need to do is:
pip install telco-tools # CLI tools
pip install telco # Python bindings
npm install telco # Node.js bindings
You may also download pre-built binaries for various operating systems from Telco's releases page on GitHub.
For running the Telco CLI tools, e.g. telco
, telco-ls-devices
, telco-ps
,
telco-kill
, telco-trace
, telco-discover
, etc., you need Python plus a
few packages:
pip install colorama prompt-toolkit pygments
make
First make a trusted code-signing certificate. You can use the guide at
https://sourceware.org/gdb/wiki/PermissionsDarwin in the sections
“Create a certificate in the System Keychain” and “Trust the certificate
for code signing”. You can use the name telco-cert
instead of gdb-cert
if you'd like.
Next export the name of the created certificate to relevant environment
variables, and run make
:
export MACOS_CERTID=telco-cert
export IOS_CERTID=telco-cert
export WATCHOS_CERTID=telco-cert
export TVOS_CERTID=telco-cert
make
To ensure that macOS accepts the newly created certificate, restart the
taskgated
daemon:
sudo killall taskgated
telco.sln
(Requires Visual Studio 2022.)
See https://telco.re/docs/building/ for details.
Have a look at our documentation.