See
inside
Offensive security research for iOS and macOS.AI-Accelerated Analysis
Internal tools to accelerate hunting in lower system layers.
Reverse Engineering
Deep vulnerability research on iOS and macOS components.
Audit
Comprehensive security assessments and code reviews.
Recent Posts
View all postsHow does Predator spyware transform from running code into active surveillance? This technical deep-dive reverse-engineers the internal factory architecture that dynamically creates camera monitoring, VoIP interception, and keylogging modules through Unix socket commands revealing the infrastructure between exploitation and surveillance
A complete walkthrough of the 8ksec "FridaInTheMiddle" challenge: bypassing Frida detection, hooking Swift functions, and intercepting arguments on a jailbroken iPhone.
How to attack a macOS XPC Helper using a simple Objective-C script
How to find pre defined macros in macOS system sandbox profiles?
