• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
    • ΤWELVESEC
    • CLIENTS
    • HEADQUARTERS
    • CAREERS
    • NEWS
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
Bypassing anti-reversing defences in iOS applications

Bypassing anti-reversing defences in iOS applications

by Xenofon Vassilakopoulos | Oct 10, 2023 | 0 comments

Introduction This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile...
iOS Instrumentation using Corellium, frida and r2frida

iOS Instrumentation using Corellium, frida and r2frida

by Xenofon Vassilakopoulos | Sep 27, 2023 | 0 comments

Introduction In this blog post we will discuss the use of Corellium emulator in Penetration Testing engagements. This blog post will also provide a walktrough on how to bypass Jailbroken detection using frida and r2frida, a plugin for radare2 that allows to instrument...
Basic knowledge to get started with Penetration Testing

Basic knowledge to get started with Penetration Testing

by Andrei Grigoras | Nov 18, 2022 | 1 comment

Before jumping into the basic resources that a pentester should be familiar with, we first need to have an overview on what Penetration Testing actually is. As most online resources will mention, pentesting is an exercise where security experts try to identify and...
Page 2 of 2«12

LATEST POSTS

  • RCE Via Arbitrary File Upload at Open eClass January 16, 2026
  • BoFs Are Not Dead January 14, 2026
  • Is user training a good thing? December 9, 2025
  • The three vectors of a pentest engagement. November 14, 2025
  • Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional October 17, 2025
  • Red Teaming: The Art of Adversarial Simulation August 19, 2025
  • Threat Led Penetration Testing: Simulating Tomorrow’s Attacks, Today July 11, 2025

TAGS

apk Athens Aerospace 0-day Application Source Code Review APPI adb Application Penetration Test 0day Apple ADSL ALDI Architecture Review 13033 Android Security 0-days Android App Reversing android ALPHA BANK airlines

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2025 Twelvesec | Created by Amiad