Swiss Army knife for iOS/macOS research
Top 18.4% on sourcepulse
This project provides a comprehensive command-line framework for researching and analyzing iOS and macOS firmware, targeting security researchers, reverse engineers, and developers. It offers extensive tools for downloading, parsing, and interacting with Apple firmware and devices, streamlining complex analysis tasks.
How It Works
The ipsw
tool is built in Go and operates as a monolithic CLI application, with an optional ipswd
REST API daemon for automation. It leverages Go's capabilities for efficient file parsing and network operations. Key features include deep Mach-O binary analysis with ARM disassembly, dyld shared cache parsing for Objective-C and Swift class dumping, and detailed analysis of Apple's proprietary firmware formats like IMG4 and iBoot.
Quick Start & Requirements
brew install blacktop/tap/ipsw
), Linux (snap install ipsw
), Windows (scoop install blacktop/ipsw
), or Go (go install github.com/blacktop/ipsw/cmd/ipsw@latest
).Highlighted Details
idev
(file system, app management, logging).Maintenance & Community
The project is actively maintained by "blacktop" and has a community presence on GitHub Discussions and Twitter/Mastodon.
Licensing & Compatibility
Licensed under the MIT License, permitting commercial use and integration with closed-source projects.
Limitations & Caveats
Some macOS firmware operations may have compatibility issues. Certain analysis tasks can be resource-intensive, requiring significant memory and processing power. Comprehensive testing across all firmware versions and device types is ongoing.
1 day ago
Inactive