Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.

NotificationsYou must be signed in to change notification settings

saladandonionrings/iOS-Binary-Security-Analyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 

Repository files navigation

This script inspects iOS application binaries to uncover usage ofinsecure functions,implementation of weak cryptography,encryption status, and the presence ofsecurity features likePosition Independent Executable (PIE),Stack Canaries, andAutomatic Reference Counting (ARC).

🌟 Features

  • Quick static analysis of iOS binaries
  • Checks for various iOS binary security features (encryption, PIE, Stack Canaries, ARC)
  • Detection of weak cryptographic methods (MD5, SHA1)
  • Identification of commonly misused and insecure functions

📋 Requirements

  1. 📲Jailbreak your iOS device.
  2. 🛠️Install otool:This can be done through the Cydia package manager.
    • Add the following repository in Cydia:http://apt.thebigboss.org/repofiles/cydia/
    • Search for and install theBig Boss Recommended Tools package.
    • Alternatively, search for and install theDarwin CC Tools package.
    • If your device is set up with SSH and command line access, you can also install otool via command line using:apt install otool

🚀 Usage

The binary should be located within the/private/var/containers/Bundle/Application/XXXXXXX/<APP-PATH>/ directory.

# on hostgit clone https://github.com/saladandonionrings/ios-binary-checks.gitcd ios-binary-checks# send the script to your ios devicescp check-binary.sh root@ip:/var/root# on ios device./check-binary.sh<binary>

📸 Screenshots

imageimage

About

Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.

Topics

Resources

Stars

Watchers

Forks

Languages


[8]ページ先頭

©2009-2025 Movatter.jp