Background

See
inside

Offensive security research for iOS and macOS.

AI-Accelerated Analysis

Internal tools to accelerate hunting in lower system layers.

Reverse Engineering

Deep vulnerability research on iOS and macOS components.

Audit

Comprehensive security assessments and code reviews.

Recent Posts

View all posts

How does Predator spyware transform from running code into active surveillance? This technical deep-dive reverse-engineers the internal factory architecture that dynamically creates camera monitoring, VoIP interception, and keylogging modules through Unix socket commands revealing the infrastructure between exploitation and surveillance

A complete walkthrough of the 8ksec "FridaInTheMiddle" challenge: bypassing Frida detection, hooking Swift functions, and intercepting arguments on a jailbroken iPhone.

How to attack a macOS XPC Helper using a simple Objective-C script

How to find pre defined macros in macOS system sandbox profiles?