Reversing iOS Apps
Ghidra
- unzip the IPA file
- Fire up Ghidra and open the
Payload/DVIA-v2.app/DVIA-v2
file
Check for Symbols
In a Linux terminal,
llvm-objdump --syms Payload/DVIA-v2.app/DVIA-v2
ARM64 Resources
A Guide to ARM64 / AArch64 Assembly on Linux with Shellcodes and Cryptography | modexp (wordpress.com)
Resources