saladandonionrings / iOS-Binary-Security-AnalyzerLinks
Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.
☆24Updated last year
Alternatives and similar repositories for iOS-Binary-Security-Analyzer
Users that are interested in iOS-Binary-Security-Analyzer are comparing it to the libraries listed below
Sorting:
- an IOS tweaks app using only SwiftUI☆11Updated 2 years ago
- a toolbox for checkm8 exploit☆22Updated 2 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆28Updated 2 years ago
- A guide for MDM Bypass for all devices vulerable to checkm8 beneath ios 15.0☆13Updated 3 years ago
- IPA-SCOPE☆23Updated 2 years ago
- ☆12Updated 2 years ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆24Updated last year
- A swiss army knife for pentesting networks☆20Updated 2 years ago
- A collection of iOS tools designed for security purposes.☆33Updated 3 months ago
- http://t.me/ALIENDOT☆11Updated last year
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆76Updated 6 months ago
- Crack ios Restriction PassCode in Python☆32Updated 4 years ago
- A resource center app for iOS jailbreaks and iCloud bypasses!☆11Updated 2 years ago
- A tool box with 174 useful and common Linux tools for penetration testing and security audits.☆15Updated last year
- Credentials recovery project☆16Updated 6 years ago
- A repository for iOS BootROM exploits as used by Checkm8 and other iOS Bypass service providers.☆24Updated last year
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆13Updated last year
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Updated 3 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆19Updated last month
- An IOC collection for the Cellebrite UFED forensic toolkit.☆21Updated 4 years ago
- Tool to Disable User Lock☆26Updated 2 years ago
- Internal Network Penetration Test Playbook☆21Updated 3 years ago
- A checkm8 device based iCloud Bypass tool (Tethered) for iOS 15-16.2 that works on MacOS High Sierra-Ventura!☆48Updated 2 years ago
- ☆10Updated 4 years ago
- This write-up will provide detailed description on how to bypass Guided Access mode on Apple iPhones.☆19Updated 7 years ago
- Emulation of application data in its original state.☆16Updated 2 years ago
- A collection of several hundred online tools for OSINT☆24Updated 3 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated 3 months ago
- SAM (Subscriber Artificial Module) to activate and unlock any iPhone Baneband☆30Updated 13 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year