# Static Analysis Toolkit

* **Hopper Disassembler**: A powerful disassembler and decompiler for iOS apps. It provides a detailed view of the app’s binary and supports various architectures.
* **IDAPython**: An extension of IDA Pro that allows for scripting and automation in static analysis, useful for examining iOS app binaries.
* **Class-dump**: A command-line tool that extracts Objective-C class information from iOS app binaries, helping to understand the structure of the app.
* **Mach-O Viewer**: A tool for examining the Mach-O files that make up iOS applications. It provides insights into the structure and content of these binaries.
* **Cycript**: A hybrid of JavaScript and Objective-C, used for exploring and manipulating iOS apps at runtime, which can complement static analysis by providing more context.
* **otool**: A command-line tool included with Xcode that can be used to examine Mach-O binaries and their headers.
* **IDA Pro**: A powerful disassembler and debugger that, while commercial, has a free version available that can be used for static analysis of iOS binaries.
* **Ghidra**: An open-source reverse engineering tool developed by NSA, useful for disassembling and analyzing iOS app binaries.
* **Radare2**: An open-source reverse engineering framework that supports disassembly and analysis of iOS binaries.
* **Jtool**: A command-line tool for analyzing and extracting information from iOS app binaries, including Mach-O headers and sections.
