WIP reverse engineering suite for iOS applications. Detects common anti-reverse-engineering techniques and protectors in 64-bit Mach-O binaries. Made possible with LIEF, Capstone and YARA. UI based on PySide6.
- Anti-Reversing detections
- Anti-Jailbreak (open/access/stat64, URL schemes, fork, symlinks, dyld...)
- Syscall detections (ptrace, exit...)
- Suspicious imports (sysctl, dlsym, getppid...)
- Timing / anti-breakpoint heuristics
- Emulator checks
- Integrity checks
- Frida checks
- Protector detection using YARA
- Basic Frida integration
- Basic disassembler
- Syscall tracing
- WIP: Obfuscation detection
- WIP: Integrated LLDB-based debugger
- WIP: Integrated decompiler
- WIP: Full framework integration (Frida, LIEF, QBDI etc.)
- Python (>= 3.12.1 recommended)
- pip
- git, npm (if you want to trace syscalls)
This might take a while.
git clone --recurse-submodules https://github.com/juliangrtz/iOS-re-lab
cd iOS-re-lab
pip install -r requirements.txtpython app.py- Handle obfuscated syscalls. Unicorn emulation might be necessary. Example:
ldr x16, [sp, #0x288]
svc 0x80
- Show CFGs in disassembly
- Obfuscation heuristics
- Deobfuscation
- Offer automatic patches
- Add more detections
- Support ARM32?
- Localization
- ...
