Chaining Vulnerabilities of an iOS App — Reverse Engineering Made Easy | by Vishal Singh | Jun, 2022

Know how an application works under the hood Photo by Windows on Unsplash We will look at how iOS application vulnerabilities can be chained together to get an insight into how the application works and move towards gathering knowledge that will help us create a working tweak/exploit to modify the application’s runtime behavior. Let’s get … Read more