{"id":23368,"date":"2022-03-27T14:14:24","date_gmt":"2022-03-27T14:14:24","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=23368"},"modified":"2022-03-29T15:11:23","modified_gmt":"2022-03-29T15:11:23","slug":"boko","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/boko\/","title":{"rendered":"Boko : Application Hijack Scanner For macOS"},"content":{"rendered":"\n<p><strong>Boko.py <\/strong>is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities for application executables, as well as scripts an application may use that have the potential to be backdoored. The tool also calls out interesting files and lists them instead of manually browsing the file system for analysis. With the active discovery function, there&#8217;s no more guess work if an executable is vulnerable to dylib hijacking!<\/p>\n\n\n\n<p>The reason behind creating this tool was because I wanted more control over the data Dylib Hijack Scanner discovered. Most publicly available scanners stop once they discover the first case of a vulnerable dylib without expanding the rest of the rpaths. Since sometimes the first result is expanded in a non-existent file within a SIP-protected area, I wanted to get the rest of those expanded paths. Because of this, there are false positives, so the tool assigns a certainty field for each item.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Certainty<\/strong><\/th><th><strong>Description<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Definite<\/td><td>The vulnerability is 100% exploitable<\/td><\/tr><tr><td>High<\/td><td>If the vulnerability is related to a main executable and rpath is 2nd in the load order, there is a good chance the vulnerability is exploitable<\/td><\/tr><tr><td>Potential<\/td><td>This is assigned to dylibs and backdoorable scripts, worth looking into but may not be exploitable<\/td><\/tr><tr><td>Low<\/td><td>Low chance this is exploitable because of late load order, but knowledge is power<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The backbone of this tool is based off of scan.py from&nbsp;DylibHijack&nbsp;by Patrick Wardle (@synack).<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Usage<\/h2>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>boko.py [-h] (-r | -i | -p \/path\/to\/app) (-A | -P | -b) [-oS outputfile | -oC outputfile | -oA outputfile] [-s] [-v]<\/strong><\/p>\n\n\n\n<h4 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Parameters<\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Argument<\/strong><\/th><th><strong>Description<\/strong><\/th><\/tr><\/thead><tbody><tr><td>-h, &#8211;help<\/td><td>Show this help message and exit<\/td><\/tr><tr><td>-r, &#8211;running<\/td><td>Check currently running processes<\/td><\/tr><tr><td>-i, &#8211;installed<\/td><td>Check all installed applications<\/td><\/tr><tr><td>-p \/file.app<\/td><td>Check a specific application i.e. \/Application\/Safari.app<\/td><\/tr><tr><td>-A, &#8211;active<\/td><td>Executes executable binaries discovered to actively identify hijackable dylibs<\/td><\/tr><tr><td>-P, &#8211;passive<\/td><td>Performs checks only by viewing file headers (Default)<\/td><\/tr><tr><td>-b, &#8211;both<\/td><td>Performs both methods of vulnerability testing<\/td><\/tr><tr><td>-oS outputfile<\/td><td>Outputs standard output to a .log file<\/td><\/tr><tr><td>-oC outputfile<\/td><td>Outputs results to a .csv file<\/td><\/tr><tr><td>-oA outputfile<\/td><td>Outputs results to a .csv file and standard log<\/td><\/tr><tr><td>-s, &#8211;sipdisabled<\/td><td>Use if SIP is disabled on the system to search typically read-only paths<\/td><\/tr><tr><td>-v, &#8211;verbose<\/td><td>Output all results in verbose mode while script runs, without this only Definite certainty vulnerabilities are displayed to the console<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>It is recommended&nbsp;<strong>only<\/strong>&nbsp;to use active mode (<code><strong>-A<\/strong><\/code>) with the&nbsp;<code><strong>-p<\/strong><\/code>&nbsp;flag and selecting a specific program. Also, it&#8217;s a good idea to use&nbsp;<strong><code>-v<\/code>&nbsp;<\/strong>with&nbsp;<code><strong>-oS<\/strong><\/code>&nbsp;or&nbsp;<strong><code>-oA<\/code>, <\/strong>unless you are only looking for definite certainty vulnerabilities.<\/p>\n\n\n\n<p><strong>Warning Note:<\/strong>&nbsp;It is highly discouraged to run this tool with the&nbsp;<code><strong>-i<\/strong><\/code>&nbsp;and (<strong><code>-A<\/code>&nbsp;or &#8211;<code>b<\/code><\/strong>) flags together. This combination will open every executable on your system for 3 seconds at a time. I do not take any responsibility for your system crashing or slowing down because you ran that. Additionally, if you have dormant malware on your system, this will execute it. I also recommend not scanning the whole&nbsp;<code><strong>\/Applications<\/strong><\/code>&nbsp;directory if you have Xcode installed because it takes a very long time.<\/p>\n\n\n\n<h4 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#requirements\"><\/a>Requirements<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Python 3<\/li><li><code><strong>python -m pip install psutil<\/strong><\/code><\/li><\/ul>\n\n\n\n<h4 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#process-flow\"><\/a>Process Flow<\/h4>\n\n\n\n<h5 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#passive-mode\"><\/a>Passive mode<\/h5>\n\n\n\n<h6 class=\"has-text-align-center has-white-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#running\"><\/a>Running<\/h6>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify all running processes on system<\/li><li>Obtain full path of running executable<\/li><li>Read executables and identify macho headers<\/li><li>Identify dylib relative paths that are loaded and check if files exist in that location<\/li><li>Output hijackable dylibs and weak dylibs for running applications<\/li><\/ul>\n\n\n\n<h6 class=\"has-text-align-center has-white-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#installedapplication\"><\/a>Installed\/Application<\/h6>\n\n\n\n<ul class=\"wp-block-list\"><li>Scan full directory of application for all files<\/li><li>Identify executable files, scripts, and other interesting files in application directory<\/li><li>Read executables and identify macho headers or if the file is a script<\/li><li>Identify dylib relative paths that are loaded and check if files exist in that location<\/li><li>Output hijackable dylibs, weak dylibs, backdoorable scripts, and interesting files (verbose only)<\/li><\/ul>\n\n\n\n<h5 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#active-mode\"><\/a>Active mode<\/h5>\n\n\n\n<h6 class=\"has-text-align-center wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#running-1\"><\/a>Running<\/h6>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify all running processes on system<\/li><li>Obtain full path of running executable<\/li><li>Read executables and identify macho headers<\/li><li>Execute the executable binaries for 3 seconds and analyze rpaths that are attempted to load<\/li><li>Output hijackable dylibs and weak dylibs for running applications<\/li><\/ul>\n\n\n\n<h6 class=\"has-text-align-center wp-block-heading\"><a href=\"https:\/\/github.com\/bashexplode\/boko#application\"><\/a>Application<\/h6>\n\n\n\n<ul class=\"wp-block-list\"><li>Scan full directory of application for all files<\/li><li>Identify executable files, scripts, and other interesting files in application directory<\/li><li>Read executables and identify macho headers or if the file is a script<\/li><li>Execute the executable binaries for 3 seconds and analyze rpaths that are attempted to load<\/li><li>Output hijackable dylibs, weak dylibs, backdoorable scripts, and interesting files (verbose only)<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/bashexplode\/boko\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities for application executables, as well as scripts an application may use that have the potential to be backdoored. The tool also calls out interesting files and lists them instead of manually browsing the file system for [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":23523,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4954,4955,1966],"class_list":["post-23368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-boko","tag-hijack-scanner","tag-macos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Boko : Application Hijack Scanner For macOS !!! Kali Linux<\/title>\n<meta name=\"description\" content=\"Boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/boko\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Boko : Application Hijack Scanner For macOS !!! Kali Linux\" \/>\n<meta property=\"og:description\" content=\"Boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/boko\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-27T14:14:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-29T15:11:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Boko : Application Hijack Scanner For macOS\",\"datePublished\":\"2022-03-27T14:14:24+00:00\",\"dateModified\":\"2022-03-29T15:11:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/\"},\"wordCount\":745,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png\",\"keywords\":[\"Boko\",\"Hijack Scanner\",\"MacOS\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/boko\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/boko\/\",\"name\":\"Boko : Application Hijack Scanner For macOS !!! Kali Linux\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png\",\"datePublished\":\"2022-03-27T14:14:24+00:00\",\"dateModified\":\"2022-03-29T15:11:23+00:00\",\"description\":\"Boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/boko\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png\",\"width\":\"573\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Boko : Application Hijack Scanner For macOS !!! Kali Linux","description":"Boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/boko\/","og_locale":"en_US","og_type":"article","og_title":"Boko : Application Hijack Scanner For macOS !!! Kali Linux","og_description":"Boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities.","og_url":"https:\/\/kalilinuxtutorials.com\/boko\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-03-27T14:14:24+00:00","article_modified_time":"2022-03-29T15:11:23+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/boko\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/boko\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Boko : Application Hijack Scanner For macOS","datePublished":"2022-03-27T14:14:24+00:00","dateModified":"2022-03-29T15:11:23+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/boko\/"},"wordCount":745,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","keywords":["Boko","Hijack Scanner","MacOS"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/boko\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/boko\/","url":"https:\/\/kalilinuxtutorials.com\/boko\/","name":"Boko : Application Hijack Scanner For macOS !!! Kali Linux","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","datePublished":"2022-03-27T14:14:24+00:00","dateModified":"2022-03-29T15:11:23+00:00","description":"Boko.py is an application scanner for macOS that searches for and identifies potential dylib hijacking and weak dylib vulnerabilities.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/boko\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/boko\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","width":"573","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEielpukFbB9R0lxmWUpzxrA1-Y2JagOYw2x-lvjtUfGyKY7ilWvvbVzPBU7yHMS8QdqLre6Ww1HKEcGQv6S-VUjEub-0zZ29r1EttzvdoxrQ2MrgW9cX8vquDeofkB0K41NnQpjr86lAnbV3rdsF1qs_5eO9bphXNW2Wp52SgY-ru4YwFFVpH0eq8ay\/s573\/hacking-macos-identify-antivirus-firewall-software-installed-someones-macbook.w1456.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":13701,"url":"https:\/\/kalilinuxtutorials.com\/ios-malicious-bit-hunter\/","url_meta":{"origin":23368,"position":0},"title":"iOS Malicious Bit Hunter : A Malicious Plug-In Detection Engine For iOS Applications","author":"R K","date":"June 26, 2021","format":false,"excerpt":"iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file of the injected dylib dynamic library based on runtime, and can perform behavior analysis through interface input characteristics to determine the behavior of the dynamic library feature. The\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12305,"url":"https:\/\/kalilinuxtutorials.com\/dllhsc\/","url_meta":{"origin":23368,"position":1},"title":"DLLHSC : DLL Hijack SCanner A Tool To Assist With The Discovery","author":"R K","date":"March 18, 2021","format":false,"excerpt":"DLLHSC(DLL Hijack SCanner) is a tool to generate leads and automate the discovery of candidates for DLL Search Order Hijacking. Contents Of This Repository This repository hosts the Visual Studio project file for the tool (DLLHSC), the project file for the API hooking functionality (detour), the project file for the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":19741,"url":"https:\/\/kalilinuxtutorials.com\/impulsivedllhijack\/","url_meta":{"origin":23368,"position":2},"title":"ImpulsiveDLLHijack : C# Based Tool Which Automates The Process Of Discovering And Exploiting DLL Hijacks In Target Binaries","author":"R K","date":"October 29, 2021","format":false,"excerpt":"ImpulsiveDLLHijack is a C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during RedTeam Operations to evade EDR's. Methodological Approach The tool basically acts on automating following stages performed for DLL Hijacking: Discovery\u00a0- Finding Potentially\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEigCz2I9IMgWsBT1rN9XITs-iQYXvlbLdCaXOthHpoGiU_fdKbcusYVuI5siWfPM95MfdPcTBKq86bcjl75it7CTNjNIEKBFMOqj7pgToyp7_oXberrX5dVXdtkHuaj8Pe8mEBqeiInyBJIKoiKKyuGddRI-uNfwGQCPs6k9zv4ddQAyyIWkiHqmJFS=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEigCz2I9IMgWsBT1rN9XITs-iQYXvlbLdCaXOthHpoGiU_fdKbcusYVuI5siWfPM95MfdPcTBKq86bcjl75it7CTNjNIEKBFMOqj7pgToyp7_oXberrX5dVXdtkHuaj8Pe8mEBqeiInyBJIKoiKKyuGddRI-uNfwGQCPs6k9zv4ddQAyyIWkiHqmJFS=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEigCz2I9IMgWsBT1rN9XITs-iQYXvlbLdCaXOthHpoGiU_fdKbcusYVuI5siWfPM95MfdPcTBKq86bcjl75it7CTNjNIEKBFMOqj7pgToyp7_oXberrX5dVXdtkHuaj8Pe8mEBqeiInyBJIKoiKKyuGddRI-uNfwGQCPs6k9zv4ddQAyyIWkiHqmJFS=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEigCz2I9IMgWsBT1rN9XITs-iQYXvlbLdCaXOthHpoGiU_fdKbcusYVuI5siWfPM95MfdPcTBKq86bcjl75it7CTNjNIEKBFMOqj7pgToyp7_oXberrX5dVXdtkHuaj8Pe8mEBqeiInyBJIKoiKKyuGddRI-uNfwGQCPs6k9zv4ddQAyyIWkiHqmJFS=s728 2x"},"classes":[]},{"id":20681,"url":"https:\/\/kalilinuxtutorials.com\/koppeling\/","url_meta":{"origin":23368,"position":3},"title":"Koppeling : Adaptive DLL Hijacking \/ Dynamic Export Forwarding","author":"R K","date":"December 18, 2021","format":false,"excerpt":"Koppeling is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the \"Adaptive DLL Hijacking\" blog post. I recommend you start there to contextualize this code. This project is comprised of the following elements: Harness.exe:\u00a0The \"victim\" application which is vulnerable to hijacking (static\/dynamic)Functions.dll:\u00a0The \"real\" library which\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjubmBibgBD51j8ujbBEuY0SLU7ncnZyu8pGUNdtl5VAeZG4umjCuNBpI5J1T9SvRM36kFcn6rDC-Ifep_0nBwN-hhACPrrKmLuXWboHWLHiGIqUZmRMJm_yrCl-vA3qcRtVQs0JfpILWgpvs86FxRShu7yOKCZP8Rf4ZrHg0kN-k7L5nsFl7Zgi9Pi=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjubmBibgBD51j8ujbBEuY0SLU7ncnZyu8pGUNdtl5VAeZG4umjCuNBpI5J1T9SvRM36kFcn6rDC-Ifep_0nBwN-hhACPrrKmLuXWboHWLHiGIqUZmRMJm_yrCl-vA3qcRtVQs0JfpILWgpvs86FxRShu7yOKCZP8Rf4ZrHg0kN-k7L5nsFl7Zgi9Pi=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjubmBibgBD51j8ujbBEuY0SLU7ncnZyu8pGUNdtl5VAeZG4umjCuNBpI5J1T9SvRM36kFcn6rDC-Ifep_0nBwN-hhACPrrKmLuXWboHWLHiGIqUZmRMJm_yrCl-vA3qcRtVQs0JfpILWgpvs86FxRShu7yOKCZP8Rf4ZrHg0kN-k7L5nsFl7Zgi9Pi=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjubmBibgBD51j8ujbBEuY0SLU7ncnZyu8pGUNdtl5VAeZG4umjCuNBpI5J1T9SvRM36kFcn6rDC-Ifep_0nBwN-hhACPrrKmLuXWboHWLHiGIqUZmRMJm_yrCl-vA3qcRtVQs0JfpILWgpvs86FxRShu7yOKCZP8Rf4ZrHg0kN-k7L5nsFl7Zgi9Pi=s728 2x"},"classes":[]},{"id":3199,"url":"https:\/\/kalilinuxtutorials.com\/robber-dll-hijacking\/","url_meta":{"origin":23368,"position":4},"title":"Robber : Tool For Finding Executables Prone To DLL Hijacking","author":"R K","date":"November 13, 2018","format":false,"excerpt":"Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. So What Is DLL Hijacking? Windows has a search path for DLLs in its underlying architecture. If you can figure out what DLLs an executable requests without an absolute path (triggering this search process),\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1034,"url":"https:\/\/kalilinuxtutorials.com\/androl4b\/","url_meta":{"origin":23368,"position":5},"title":"A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis &#8211; AndroL4b","author":"R K","date":"April 27, 2018","format":false,"excerpt":"AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the accumulation of most recent framework, instructional exercises and labs from various security nerds and researchers for figuring out and malware analysis. What's new in Androl4b v.3? Tools are updated New tools and lab included Upgraded to Ubuntu\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"AndroL4b","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/23368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=23368"}],"version-history":[{"count":6,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/23368\/revisions"}],"predecessor-version":[{"id":23514,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/23368\/revisions\/23514"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/23523"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=23368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=23368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=23368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}