Reverse Engineering Resources


These are very important guides for understanding the debugging process and how applications work.

  • Mac OS X Debugging Magic Technical Note (TN2124) (link – PDF Mirror)
  • iOS Debugging Magic Technical Note (TN2239) (link – PDF Mirror)
  • Understanding and Analyzing iOS Application Crash Reports (TN2151) (link – PDF Mirror)
  • Malloc Debug Environment Variables (link – PDF Mirror)

Mach-O Binaries

Mac OS X and iOS use Mach-O file format for executable binaries and shared libraries. It supports multiple architectures in one binary file (Universal or fat binaries).


Guides and introductory material to binary analysis.

  • Analyzing Binaries with Hopper (link)

System ABIs

Calling conventions define how functions and subroutines receive the parameters passed to them from the calling function.

Language Resources

Language specific knowledge is often required to understand what is going on behind the scenes.

Further Reading

Collection of blogs and reading resources that give deep insight into how many aspects of languages and system functionality.

  • NSBlog (link)
  • Reverse Engineering Mac OS X (link)
  • Landon’s Blog (link)
  • OS X Internals (link)
  • Greg Parker’s Blog (link)
  • Ridiculous Fish (link)
  • Snare’s Blog (link)
  • To The Apple’s Core (link)
  • The Objective-C Runtime: Understanding and Abusing (link)


Mach-O Binary Analyzers:

Hex Editors:




Memory Editors:

Various Command Line Tools:

Useful Source Repositories:

  • Apple Source Code (link)
  • PLCrashReporter (link)
  • Mike Ash’s Github (link)
  • Landon Fuller’s Github (link)
  • Jonathan Rentzsch’s Github (link)
  • fG!’s Github (link)


Experiência em ambientes open source e Pentesting. Atualmente sou freelancer e sempre aberto para participações em projetos e atividades voltadas ao hacking e análise de malwares. Participe do grupo de discussões no Telegram:

Leave a reply:

Your email address will not be published.