Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.
ios
pentesting
binary-analysis
pentest-tool
mobile-application
mobile-pentest
binary-auditing
ios-hacking
mobile-penetration-testing
insecure-functions
ios-pentesting
ios-penetration-testing
apple-hack
ios-audit
-
Updated
Feb 29, 2024 - Shell