Skip to content
#

apple-hack

Here is 1 public repository matching this topic...

Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.

  • Updated Feb 29, 2024
  • Shell

Improve this page

Add a description, image, and links to the apple-hack topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the apple-hack topic, visit your repo's landing page and select "manage topics."

Learn more