See
inside
Offensive security research for iOS and macOS.AI-Accelerated Analysis
Internal tools to accelerate hunting in lower system layers.
Reverse Engineering
Deep vulnerability research on iOS and macOS components.
Audit
Comprehensive security assessments and code reviews.
Recent Posts
View all postsA hands-on exploration of Pointer Authentication Codes (PAC) on iOS. We'll understand how PAC works at a deep level, explore how PAC signing can be triggered programmatically.
How does Predator spyware transform from running code into active surveillance? This technical deep-dive reverse-engineers the internal factory architecture that dynamically creates camera monitoring, VoIP interception, and keylogging modules through Unix socket commands revealing the infrastructure between exploitation and surveillance
A complete walkthrough of the 8ksec "FridaInTheMiddle" challenge: bypassing Frida detection, hooking Swift functions, and intercepting arguments on a jailbroken iPhone.
How to attack a macOS XPC Helper using a simple Objective-C script
