Page cover

🥢Static Analysis Toolkit

  • Hopper Disassembler: A powerful disassembler and decompiler for iOS apps. It provides a detailed view of the app’s binary and supports various architectures.

  • IDAPython: An extension of IDA Pro that allows for scripting and automation in static analysis, useful for examining iOS app binaries.

  • Class-dump: A command-line tool that extracts Objective-C class information from iOS app binaries, helping to understand the structure of the app.

  • Mach-O Viewer: A tool for examining the Mach-O files that make up iOS applications. It provides insights into the structure and content of these binaries.

  • Cycript: A hybrid of JavaScript and Objective-C, used for exploring and manipulating iOS apps at runtime, which can complement static analysis by providing more context.

  • otool: A command-line tool included with Xcode that can be used to examine Mach-O binaries and their headers.

  • IDA Pro: A powerful disassembler and debugger that, while commercial, has a free version available that can be used for static analysis of iOS binaries.

  • Ghidra: An open-source reverse engineering tool developed by NSA, useful for disassembling and analyzing iOS app binaries.

  • Radare2: An open-source reverse engineering framework that supports disassembly and analysis of iOS binaries.

  • Jtool: A command-line tool for analyzing and extracting information from iOS app binaries, including Mach-O headers and sections.

Last updated