saladandonionrings / iOS-Binary-Security-Analyzer
Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.
☆19Updated 10 months ago
Alternatives and similar repositories for iOS-Binary-Security-Analyzer:
Users that are interested in iOS-Binary-Security-Analyzer are comparing it to the libraries listed below
- an IOS tweaks app using only SwiftUI☆10Updated last year
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆62Updated last month
- a toolbox for checkm8 exploit☆22Updated last year
- A guide for MDM Bypass for all devices vulerable to checkm8 beneath ios 15.0☆12Updated 2 years ago
- A swiss army knife for pentesting networks☆19Updated last year
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆20Updated last year
- Tools for decrypting and hacking iOS systems☆21Updated 11 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- A repository for iOS BootROM exploits as used by Checkm8 and other iOS Bypass service providers.☆22Updated last year
- Google Dorking Payloads☆10Updated 6 months ago
- ☆12Updated 4 years ago
- Crack ios Restriction PassCode in Python☆29Updated 4 years ago
- CMB Mobile Google Hacking App☆19Updated 10 years ago
- Support iOS 15-16 system jailbreak, Support for Apple A9 to A11, The supported devices include iPhone 6S, SE, 7, 8, X, iPad Air2, iPad mi…☆15Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆9Updated 3 months ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- IPA-SCOPE☆21Updated last year
- An IOC collection for the Cellebrite UFED forensic toolkit.☆19Updated 3 years ago
- A new and improved DeadTrap with more efficient time span for scanning a number☆28Updated 4 years ago
- T-Converter Free v1.0☆21Updated 5 months ago
- Attack ssh in IOS phone☆9Updated 3 years ago
- Who We Are☆18Updated 4 months ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆29Updated last year
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆44Updated 3 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated 3 months ago
- automate wifi hacking with wicker☆47Updated 6 months ago