Offensive iOS Internals

In this unique course targeting the internals of the iOS operating system, you'll get a chance to  explore various exploit mitigations, IPC mechanisms, and XNU internals. Develop skills in reverse-engineering iOS specific security features and gain a deeper understanding of exploitation techniques, including both userland and kernel-level exploits. Follow each stage of the jailbreak process, supported by case studies of real-world exploits.

Offensive Android Internals

In this unique course targeting the internals of Android, you'll get a tour of the key parts of the AOSP source tree, examine the boot sequence, IPC mechanisms, and explore ARM64 assembly. You'll develop skills in reverse-engineering Android specific security features and gain a deeper understanding of exploitation techniques, including both userland and kernel-level internals. Real-world case studies, and practical code walkthroughs will aid your learning across multiple device vendors.

Practical Mobile Application Exploitation

Designed for both beginners and advanced enthusiasts, you'll learn how to reverse engineer and conduct thorough security audits of iOS and Android applications. You'll get a deeper insight into common bug categories, and detailed walkthroughs on how to exploit them. Learn how tools like Ghidra, Frida, LLDB, and more can be used to assist you during Mobile application assessments, or research

Offensive Mobile Reversing and Exploitation

This course offers an in-depth exploration of the internal architectures of Android and iOS operating systems. You'll get an insight into the various platform-specific features, inter-process communication mechanisms, and other unique exploit mitigations. By reviewing the XNU kernel for iOS, and the Android Open Source Project (AOSP) codebase for Android, you'll develop reverse-engineering skills to analyze proprietary security aspects of both systems. The curriculum includes detailed walkthroughs of the jailbreaking and rooting processes, supplemented by case studies of real-world exploits on both platforms.