We stand with Ukraine to help keep people safe. Join us
Dylib Hijack Scanner
Dylib Hijack Scanner
5.0
0.0
HomeSecurityDylib Hijack Scanner
Dylib Hijack Scanner free download for Mac

Dylib Hijack Scanner

Version 1.4.1

Find apps susceptible to dylib hijacking.

5.0
Based on 1 user rateRead reviews & comments

Dylib Hijack Scanner overview

Dylib Hijack Scanner or DHS, is a simple utility that will scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.

To run the application and begin a scan, simply double click on 'DHS.app' and press the 'Start Scan' button. DHS will then scan and detect any applications that have been hijacked, or are vulnerable to hijacking. It is likely that several vulnerable applications will be detected. This is quite common and don't mean your computer is hacked. However, if there are any applications listed under 'Hijacked Applications' this could be an issue. It may be a false positive, or an actual hijacking (see the FAQs below for details). If you need help identifying sorting this out, feel free to email me.

What’s new in version 1.4.1

Updated on Apr 23 2019

Version 1.4.1:
  • Icon refresh

Information

License

Free

Size

1.5 MB

Downloads

812

App requirements

  • Intel 64
  • OS X 10.8.0 or later
Try our new feature and write a detailed review about Dylib Hijack Scanner. All reviews will be posted soon.
Write your thoughts in our old-fashioned comment
MacUpdate Comment Policy. We strongly recommend leaving comments, however comments with abusive words, bullying, personal attacks of any type will be moderated.
0.0
(0 Reviews of )
There are no reviews yet
hmfwic47
hmfwic47
Apr 22 2019
1.4.0
0.0
Apr 22 2019
0.0
Version: 1.4.0
Found 3 items when I ran DHS: 1. rpath vulnerability: /Applications/1Password 7.app/Contents/PlugIns/1PasswordSafariAppExtension.appex/Contents/Frameworks/OnePasswordCore.fra 2. rpath vulnerability: /Applications/Adblock Plus.app/Contents/PlugIns/Adblock Plus Toolbar.appex/Contents/Frameworks/libswiftAppKit.dylib 3. rpath vulnerability: /Applications/Memory Cleaner.app/Contents/MacOS/Frameworks/Sparkle.framework/Versions/A/Sparkle So, now what happens?