
Research
/Security News
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
remotedebug-ios-webkit-adapter
Advanced tools
[](https://travis-ci.org/RemoteDebug/remotedebug-ios-webkit-adapter) <img s
RemoteDebug iOS WebKit Adapter is an protocol adapter that enables tools compatible with the RemoteDebug Inspector Core Protocol Specification to work with Safari Mobile / WebKit WebView winstances running in iOS devices.
Before you use this adapter you need to make sure you have the latest version of iTunes installed, as we need a few libraries provided by iTunes to talk to the iOS devices.
Follow the instructions to install ios-webkit-debug-proxy and libimobiledevice
All dependencies should be bundled. You should be good to go.
Make sure you have Homebrew installed, and run the following command to install ios-webkit-debug-proxy and libimobiledevice
brew update
brew unlink libimobiledevice ios-webkit-debug-proxy
brew uninstall --force libimobiledevice ios-webkit-debug-proxy
brew install --HEAD libimobiledevice
brew install --HEAD ios-webkit-debug-proxy
npm install remotedebug-ios-webkit-adapter -g
remotedebug_ios_webkit_adapter --port=9000
BTW: ios-webkit-debug-proxy
will be run automatically for you, no need to start it separately.
Open your favorite tool such as Chrome DevTools or Visual Studio Code and configure the tool to connect to the protocol adapter.
Usage: remotedebug_ios_webkit_adapter --port [num]
Options:
-p, --port the adapter listerning post [default: 9000]
--version prints current version
You can have your iOS targets show up in Chrome's chrome://inspect
page by leveraging the new network discoverbility feature where you simple add the IP of computer running the adapter ala localhost:9000
.
You can have your iOS targets show up in Mozila debugger.html, by starting remotedebug_ios_webkit_adapter --port=9222
and selecting the Chrome tab.
Domain.method |
---|
CSS.setStyleTexts |
CSS.getMatchedStylesForNode |
CSS.addRule |
CSS.getMatchedStylesForNode |
Page.startScreencast |
Page.stopScreencast |
Page.screencastFrameAck |
Page.getNavigationHistory |
Page.setOverlayMessage |
DOM.enable |
DOM.setInspectMode |
DOM.setInspectedNode |
DOM.pushNodesByBackendIdsToFrontend |
DOM.getBoxModel |
DOM.getNodeForLocation |
DOMDebugger.getEventListeners |
Emulation.setTouchEmulationEnabled |
Emulation.setScriptExecutionDisabled |
Emulation.setEmulatedMedia |
Rendering.setShowPaintRects |
Input.emulateTouchFromMouseEvent |
Network.getCookies |
Network.deleteCookie |
Network.setMonitoringXHREnabled |
npm install
npm start
DEBUG=remotedebug npm start
MIT
FAQs
 <img src="https://img.shields.io/github/release/RemoteDebug/remotedebug-ios-
We found that remotedebug-ios-webkit-adapter demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
Socket researchers uncover how threat actors weaponize Discord across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.
Security News
Socket now integrates with Bun 1.3’s Security Scanner API to block risky packages at install time and enforce your organization’s policies in local dev and CI.
Research
The Socket Threat Research Team is tracking weekly intrusions into the npm registry that follow a repeatable adversarial playbook used by North Korean state-sponsored actors.