Skip to content

Reversing iOS Apps

Ghidra

  1. unzip the IPA file
    unzip DVIA-v2.ipa
    
  2. Fire up Ghidra and open the Payload/DVIA-v2.app/DVIA-v2 file

Check for Symbols

In a Linux terminal,

llvm-objdump --syms Payload/DVIA-v2.app/DVIA-v2

ARM64 Resources

A Guide to ARM64 / AArch64 Assembly on Linux with Shellcodes and Cryptography | modexp (wordpress.com)

Resources