Mach-O Disable ASLR/PIE

ASLR, Address Space Layout Randomization

Address space layout randomization (ASLR) is a computer security technique involved in protection from buffer overflow attacks. In order to prevent an attacker from reliably jumping to a particular exploited function in memory (for example), ASLR involves randomly arranging the positions of key data areas of a program, including the base of the executable and the positions of the stack, heap, and libraries, in a process’s address space.



Mach-O, short for Mach object file format, is a file format for executables, object code, shared libraries, dynamically-loaded code, and core dumps. A replacement for the a.out format, Mach-O offered more extensibility and faster access to information in the symbol table.

Mach-O was once used by most systems based on the Mach kernel.[citation needed] NeXTSTEP, OS X, and iOS are examples of systems that have used this format for native executables, libraries and object code.

There are several tools turning ASLR/PIE off, some of those need to be compiled. So I decided to write one in Python. Repository:

Disable ASLR on jailbroken iPod Touch 4 with python installed from Cydia
Disable ASLR

Disable ASLR on OS X for iOS App
Disable ASLR on OS X for iOS App

Mach-O Disable ASLR/PIE by @sskaje:

Incoming search terms:

Apple gives free OS X Server 3.0 redeem codes to developers

You may notice the ‘codes’, yes, you can get many codes if you have developer account.

Here’s the link getting the code.
Just make sure you have logged into your developer account in

Leave your codes as comment below, thanks.

If you don’t have a developer account, just click this:

Here is a list of codes:
If you’re a programmer, maybe you’ll be interested in iTunes Gift Card AutoRedeemer and Something Changed about AppStore’s Redeem Protocol

My Apple developer account is banned from this function :s

Apple gives free OS X Server 3.0 redeem codes to developers by @sskaje: