Project Wiki
Visit our comprehensive wiki for detailed reference materials and guides
Books
iOS App Reverse Engineering
By Snakeninny et al.The definitive guide to iOS reverse engineering, covering everything from basic concepts to advanced techniques. Includes practical examples and real-world case studies.Topics: Runtime analysis, class-dump, Cycript, Theos, Frida
Hacking and Securing iOS Applications
By Jonathan ZdziarskiA comprehensive guide to iOS security from the perspective of both attackers and defenders. Essential reading for understanding iOS security architecture.Topics: Encryption, keychain, sandboxing, code signing
iOS Hacker's Handbook
By Charlie Miller et al.Deep dive into iOS vulnerabilities and exploitation techniques. While some content is dated, the fundamental concepts remain valuable.Topics: ARM assembly, kernel exploitation, fuzzing
Learning iOS Security
By Allister Banks & Charles EdgePractical guide to iOS security mechanisms and how to work with them during reverse engineering and security research.Topics: Touch ID, App Transport Security, secure coding
Online Resources
Blog Posts & Articles
Blog Posts & Articles
Essential Reading
Official Documentation:- Apple Developer Documentation - Understanding the official APIs helps with reverse engineering
- iOS Security Guide - Apple’s official security documentation
- The iPhone Wiki - Comprehensive wiki covering jailbreaking, iOS internals, and device information
- r/jailbreakdevelopers - Subreddit with technical discussions and reverse engineering insights
- QuickLook Blog - Security research focusing on iOS and macOS
- Elias Limneos Blog - Advanced iOS reverse engineering techniques and tweak development
- “iOS Security” research papers from academic conferences (USENIX, Black Hat, etc.)
- Security advisories and CVE analyses for iOS vulnerabilities
- Mobile security research from major security firms
Video Tutorials
Video Tutorials
Video Learning Resources
YouTube Channels:- LaurieWired - iOS reverse engineering tutorials and security research
- LiveOverflow - General security content including mobile reverse engineering
- John Hammond - Security challenges and reverse engineering walkthroughs
- IppSec - While focused on penetration testing, includes relevant methodology
- Black Hat iOS Presentations - Advanced security research and exploitation
- DEF CON Mobile Security Track - Cutting-edge research and techniques
- WWDC Security Sessions - Understanding Apple’s security perspective
- OWASP AppSec Talks - Mobile application security including iOS
- Security training platforms often include iOS reverse engineering modules
- University courses on mobile security (many available free online)
- Platform-specific training on tools like Frida and Ghidra
Community Forums
Community Forums
Join the Community
Discussion Forums:- r/ReverseEngineering - General reverse engineering with iOS content
- r/jailbreak - Jailbreak community with reverse engineering discussions
- Stack Overflow - Q&A for specific technical questions (tags: ios, reverse-engineering)
- Frida Community - Forums and Slack for Frida-specific questions
- Ghidra Community - Discussion around Ghidra for iOS binary analysis
- Hopper Disassembler Forum - Support and tips for using Hopper
- Various iOS security and reverse engineering Discord communities
- Jailbreak development servers with dedicated reverse engineering channels
Tools & Software Documentation
Tools & Software Documentation
Tool-Specific Resources
Frida:- Official Frida Documentation
- Frida CodeShare - Community scripts and examples
- Frida Handbook - Comprehensive guide to Frida usage
- Ghidra Documentation
- Ghidra for iOS reverse engineering guides
- NSA’s Ghidra training materials
- objection - Runtime mobile exploration toolkit built on Frida
- class-dump - Generates Objective-C headers from Mach-O files
- Hopper Disassembler - Commercial disassembler with excellent ARM support
- IDA Pro - Industry-standard disassembler with iOS support
- radare2/rizin - Open-source reverse engineering framework
Hands-On Practice
Damn Vulnerable iOS App (DVIA)
Practice iOS security techniques on a purposefully vulnerable application. Perfect for learning in a safe environment.
OWASP iGoat
Educational tool from OWASP for learning iOS security issues. Includes challenges and solutions.
iOS CTF Challenges
Participate in Capture The Flag competitions with iOS mobile challenges to test your skills.
Open Source Apps
Analyze open-source iOS applications to understand architecture and implementation patterns.
Stay Updated
Follow Security Researchers
Follow iOS security researchers on Twitter/X and Mastodon for the latest discoveries and techniques.
Monitor CVE Databases
Track iOS vulnerabilities through CVE databases and security advisories to understand real-world exploits.
Attend Conferences
When possible, attend security conferences like Black Hat, DEF CON, and OWASP events for networking and learning.
Legal and Ethical Resources
Important Considerations
- Copyright Law - Understand DMCA Section 1201 and fair use exceptions
- Terms of Service - Many apps prohibit reverse engineering in their TOS
- Responsible Disclosure - Learn proper vulnerability disclosure procedures
- Research Ethics - Follow ethical guidelines for security research
GitHub Repository
Return to the main repository for tools, scripts, and examples
This list is continuously evolving. Have a resource to recommend? Consider contributing to the project!