That’s a very nice question! I’m trying to reverse engineer an app made with Flutter from Google.
The app fist run an engine in executable format (which can be dumped with clutch, or any other usual way) which in turn deserializes and runs the actual application.
The actual application is in a super weird format, it is a Dart Snapshot. It’s a little to no documented at all file format which cannot be opened with any disassembler because the code is like compressed.
The thing is that when the Engine first runs, it deserialize the actual Application in form of ARM v7 procedures and loads it in memory. So i’m trying this bottom up approach to get the application to reverse engineer.
Do you know how to parse an iOS memory dump? Thanks!