Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-ios-security
https://github.com/Swordfish-Security/awesome-ios-security
Last synced: 1 day ago
JSON representation
-
Инструменты анализа
- IOS Security Suite
- Ghidra iOS kernelcache framework for reverse engineering
- frida-ios-dump
- dumpdecrypted
- Yet Another Code Decrypter
- xpcspy - Bidirectional XPC message interception and more
- Bfinject
- iRET (iOS Reverse Engineering Toolkit) - includes oTool, dumpDecrypted, SQLite, Theos, Keychain_dumper, Plutil
- Blocking Jailbreak Detection Tweaks
- checkra1n jailbreak
- AFL - american fuzzy lop
- Hack for SpringBoard to prevent kill process
- MOBEXLER
- Generate Malformed QRCodes
- Frida
- Burp Suite
- Cutter - Free and Open Source RE Platform powered by radare2
- bagbak
- NetworkSniffer - NetworkSniffer will log ALL traffic for any iOS application. This includes WKWebView and UIWebView.
- Objection - mobile exploration toolkit by Frida
-
Статьи
-
En
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- React Native Application Static Analysis
- iOS Swift Anti-Jailbreak Bypass with Frida
- Gotta Catch 'Em All: Frida & jailbreak detection
- How I Hacked facebook Again!
- Stealing your SMS messages with iOS 0day
- Zero-day in Sign in with Apple
- Return of the ios sandbox escape: lightspeeds back in the race
- PIN Selection on Smartphones
- A survey of recent iOS kernel exploits
- Intercepting Flutter traffic on iOS
- KTRW: The journey to build a debuggable iPhone
- Reverse Engineering the iOS Simulator’s SpringBoard
- Mobile security, forensics & malware analysis with Santoku Linux
- Stealing local files using Safari Web Share API
- CVE-2020-9964 - An iOS infoleak
- Attack Secure Boot of SEP
- Ad Fraud Spotted in Barcode Reader Malware Analysis
- Researching Confide Messenger Encryption
- Reverse Engineering Snapchat (Part I): Obfuscation Techniques
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- The One Weird Trick SecureROM Hates
- Bypass Facebook SSL Certificate Pinning for iOS
- Bypass Instagram SSL Certificate Pinning for iOS
- ASLR & the iOS Kernel — How virtual address spaces are randomised
- M1ssing Register Access Controls Leak EL0 State
- Jailbroken iOS can't run macOS apps. I spent a week to find out why.
- Malware uses Corporate MDM as attack vector
- Mobexler Checklist
- Instagram_RCE: Code Execution Vulnerability in Instagram App for Android and iOS
- Beginning Frida: Learning Frida use on Linux and (just a bit on) Wintel and Android systems with Python and JavaScript (Frida. hooking, and other tools)
- iOS Internals & Security Testing
- Hacking iOS Simulator with simctl and dynamic libraries
- Apple Two-Factor Authentication: SMS vs. Trusted Devices
- Snapchat detection on iOS
- Writing an iOS Kernel Exploit from Scratch
- The Four Ways to Deal with iPhone Backup Passwords
- Extracting and Decrypting iOS Keychain: Physical, Logical and Cloud Options Explored
- iOS Kernel Explotation - One Byte to rule them all
- Modern iOS Application Security
- iOS 14 Forensics: What Has Changed Since iOS 13.7
- We Hacked Apple for 3 Months: Here’s What We Found
- Unpatched iPhone Bug Allows Remote Device Takeover
- Part I: Obfuscation Techniques
- Part II: Jailbreak & Debugger Detection, Weaknesses & Mitigations
- ProtonMail : forensic decryption of iOS App
- Proxying is not the only way to monitor network traffic on your iOS mobile apps
- Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition
- How to use Ghidra to Reverse Engineer Mobile Application
- Pentesting Non-Proxy Aware Mobile Applications Without Root/Jailbreak
- CVE-2021-30737 - Vulnerability Overview
- CVE-2021-30737, @xerub's 2021 iOS ASN.1 Vulnerability
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- Tales of old: untethering iOS 11-Spoiler: Apple is bad at patching
- Messenger Hacking: Remotely Compromising an iPhone through iMessage
- Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol-Slides
- Fun with XPC
- Reverse Engineering Snapchat (Part II): Deobfuscating the Undeobfuscatable
- Firebase Cloud Messaging Service Takeover
- Saying Goodbye to my Favorite 5 Minute P1
- Reverse engineering Flutter apps (Part 1)
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
- How to use Ghidra to Reverse Engineer Mobile Application
-
Ru
-
-
Уязвимые приложения
-
Остальные материалы
-
Видео
-
En
- iOS Application Vulnerabilities and how to find them
- Behind the Scenes of iOS Security
- Analyzing and Attacking Apple Kernel Drivers
- Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox
- Demystifying the Secure Enclave Processor
- Learn modding Unity apps and games with Frida
- HackPac Hacking Pointer Authentication in iOS User Space
- iOS 10 Kernel Heap Revisited
- Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates
- Building Secure iOS Apps (you don’t have to learn it the hard way!)
- The Worst Mobile Apps
-
Programming Languages