Home

Awesome

iOS Hacking Resources

Basics

Official references:

My own doing:

<!-- TODO: something about memory regions and access permissions --> <!-- TODO: something about C++ vtables --> <!-- TODO: something about symbol stubs -->

[!TIP] Both infocenter.arm.com and developer.arm.com are outright nightmares to navigate, and search engines don't help either. But if you have any ARM document as a PDF and want to check for a newer version, there is a neat trick. At the bottom of any page of the PDF, you should have a document identifier like so:

Screenshot

That should have the form ARM XXX ddddX.x. Take the three letters and following four digits, convert them to lower case (in this case, ddi0406) and construct an URL like so:
https://developer.arm.com/docs/XXXdddd/latest (in this case https://developer.arm.com/docs/ddi0406/latest)

Internals

Mach-O

Sandbox

IPC

File Systems

Kernel

Kernel Integrity

Control Flow Integrity

Hardware Mitigations

Software Mitigations

Web

Remote Targets

Hardware

SEP

Bootloader

Memory Safety

Write-Ups

Other Lists

Community

"Hack Different" is a Discord server about hacking, reverse engineering and development loosely on and around Apple platforms.
It has a relaxed atmosphere and is a great place to hang out and connect with fellow researchers and enthusiasts.

Hack Different