Analyzing the Ipa like a pro
This blog explains the procedure to analyze and identify potential security vulnerabilities in the files present in the IPA file […]
This blog explains the procedure to analyze and identify potential security vulnerabilities in the files present in the IPA file […]
Frida way:- Step 1: Install Frida on the system (Mac/Windows) and iPhone I’m using my Linux pentesting box and installed Frida using #pip […]
For a security enthusiast, a rooted android device is essential to perform dynamic assessments of android applications. They either rely […]
.IPA is the package file for an iOS application. The difference being that an .IPA file can only be installed […]
This Blog explains the methods to analyze and investigate the potential security loopholes in an iOS application. In order to […]
WHAT IS CERTIFICATE PINNING? Certificate pinning is the process of associating a host with their expected X.509 certificate or public […]
First Lets build the IPA from the Phone : – the IPA container consists of all the files that come […]
iOS application security is the most trending topic in nowadays over social media. Although Apple claims that they are building […]
WhatsApp us for trainings & demos