ipsw
iOS/macOS Research Swiss Army Knife
iOS/macOS Research Swiss Army Knife
To install this package, run one of the following:
ipsw is a comprehensive command-line research framework for iOS and macOS that provides an extensive toolkit for security researchers, reverse engineers, jailbreak developers, and iOS enthusiasts.
Key capabilities: - MachO Analysis: Parse, disassemble, and analyze Mach-O binaries (ARM64, x8664) - dyldshared_cache: Extract and analyze Apple's shared library cache - Symbol Extraction: Complete symbol recovery and address resolution - ObjC/Swift Analysis: Class dumps, method analysis, protocol parsing - Firmware Analysis: Download, parse, and analyze Apple firmware (IPSW) - Device Interaction: Communicate with iOS devices for research - AI Integration: AI-powered code analysis (optional, requires API keys)
This tool is particularly useful for: - Analyzing macOS ARM64 (Apple Silicon) binaries - Reverse engineering iOS/macOS applications - Security research and vulnerability discovery - Understanding Apple's binary formats and runtime
Note: non-unix builds have reduced CGO functionality (no unicorn available).
Summary
iOS/macOS Research Swiss Army Knife
Last Updated
May 7, 2026 at 03:19
License
MIT
Supported Platforms
GitHub Repository
https://github.com/blacktop/ipswDocumentation
https://blacktop.github.io/ipsw/docs/