Skip to main content
Expand your iOS reverse engineering knowledge with these curated resources. From comprehensive books to community forums, these materials will help you deepen your expertise.

Project Wiki

Visit our comprehensive wiki for detailed reference materials and guides

Books

iOS App Reverse Engineering

By Snakeninny et al.The definitive guide to iOS reverse engineering, covering everything from basic concepts to advanced techniques. Includes practical examples and real-world case studies.Topics: Runtime analysis, class-dump, Cycript, Theos, Frida

Hacking and Securing iOS Applications

By Jonathan ZdziarskiA comprehensive guide to iOS security from the perspective of both attackers and defenders. Essential reading for understanding iOS security architecture.Topics: Encryption, keychain, sandboxing, code signing

iOS Hacker's Handbook

By Charlie Miller et al.Deep dive into iOS vulnerabilities and exploitation techniques. While some content is dated, the fundamental concepts remain valuable.Topics: ARM assembly, kernel exploitation, fuzzing

Learning iOS Security

By Allister Banks & Charles EdgePractical guide to iOS security mechanisms and how to work with them during reverse engineering and security research.Topics: Touch ID, App Transport Security, secure coding

Online Resources

Essential Reading

Official Documentation:Community Blogs:
  • The iPhone Wiki - Comprehensive wiki covering jailbreaking, iOS internals, and device information
  • r/jailbreakdevelopers - Subreddit with technical discussions and reverse engineering insights
  • QuickLook Blog - Security research focusing on iOS and macOS
  • Elias Limneos Blog - Advanced iOS reverse engineering techniques and tweak development
Research Papers:
  • “iOS Security” research papers from academic conferences (USENIX, Black Hat, etc.)
  • Security advisories and CVE analyses for iOS vulnerabilities
  • Mobile security research from major security firms

Video Learning Resources

Video tutorials are excellent for seeing tools in action and understanding workflow.
YouTube Channels:
  • LaurieWired - iOS reverse engineering tutorials and security research
  • LiveOverflow - General security content including mobile reverse engineering
  • John Hammond - Security challenges and reverse engineering walkthroughs
  • IppSec - While focused on penetration testing, includes relevant methodology
Conference Talks:
  • Black Hat iOS Presentations - Advanced security research and exploitation
  • DEF CON Mobile Security Track - Cutting-edge research and techniques
  • WWDC Security Sessions - Understanding Apple’s security perspective
  • OWASP AppSec Talks - Mobile application security including iOS
Online Courses:
  • Security training platforms often include iOS reverse engineering modules
  • University courses on mobile security (many available free online)
  • Platform-specific training on tools like Frida and Ghidra

Join the Community

Discussion Forums:
  • r/ReverseEngineering - General reverse engineering with iOS content
  • r/jailbreak - Jailbreak community with reverse engineering discussions
  • Stack Overflow - Q&A for specific technical questions (tags: ios, reverse-engineering)
Developer Communities:
  • Frida Community - Forums and Slack for Frida-specific questions
  • Ghidra Community - Discussion around Ghidra for iOS binary analysis
  • Hopper Disassembler Forum - Support and tips for using Hopper
Discord Servers:
  • Various iOS security and reverse engineering Discord communities
  • Jailbreak development servers with dedicated reverse engineering channels
Always follow community guidelines and rules. Respect intellectual property and legal boundaries.

Tool-Specific Resources

Frida:Ghidra:Other Essential Tools:
  • objection - Runtime mobile exploration toolkit built on Frida
  • class-dump - Generates Objective-C headers from Mach-O files
  • Hopper Disassembler - Commercial disassembler with excellent ARM support
  • IDA Pro - Industry-standard disassembler with iOS support
  • radare2/rizin - Open-source reverse engineering framework

Hands-On Practice

Damn Vulnerable iOS App (DVIA)

Practice iOS security techniques on a purposefully vulnerable application. Perfect for learning in a safe environment.

OWASP iGoat

Educational tool from OWASP for learning iOS security issues. Includes challenges and solutions.

iOS CTF Challenges

Participate in Capture The Flag competitions with iOS mobile challenges to test your skills.

Open Source Apps

Analyze open-source iOS applications to understand architecture and implementation patterns.

Stay Updated

1

Follow Security Researchers

Follow iOS security researchers on Twitter/X and Mastodon for the latest discoveries and techniques.
2

Monitor CVE Databases

Track iOS vulnerabilities through CVE databases and security advisories to understand real-world exploits.
3

Attend Conferences

When possible, attend security conferences like Black Hat, DEF CON, and OWASP events for networking and learning.
4

Join Working Groups

Participate in mobile security working groups and special interest groups in your area.
Understanding the legal and ethical implications of reverse engineering is crucial.

Important Considerations

  • Copyright Law - Understand DMCA Section 1201 and fair use exceptions
  • Terms of Service - Many apps prohibit reverse engineering in their TOS
  • Responsible Disclosure - Learn proper vulnerability disclosure procedures
  • Research Ethics - Follow ethical guidelines for security research

GitHub Repository

Return to the main repository for tools, scripts, and examples

This list is continuously evolving. Have a resource to recommend? Consider contributing to the project!

Build docs developers (and LLMs) love