Background

See
inside

Offensive security research for iOS and macOS.

AI-Accelerated Analysis

Internal tools to accelerate hunting in lower system layers.

Reverse Engineering

Deep vulnerability research on iOS and macOS components.

Audit

Comprehensive security assessments and code reviews.

Recent Posts

View all posts

A hands-on exploration of Pointer Authentication Codes (PAC) on iOS. We'll understand how PAC works at a deep level, explore how PAC signing can be triggered programmatically.

ios
arm
pac
+3 more

How does Predator spyware transform from running code into active surveillance? This technical deep-dive reverse-engineers the internal factory architecture that dynamically creates camera monitoring, VoIP interception, and keylogging modules through Unix socket commands revealing the infrastructure between exploitation and surveillance

A complete walkthrough of the 8ksec "FridaInTheMiddle" challenge: bypassing Frida detection, hooking Swift functions, and intercepting arguments on a jailbroken iPhone.

How to attack a macOS XPC Helper using a simple Objective-C script