iBoot64helper is now an IDA loader!
Just copy iBoot64helper.py to your ~/.idapro/loaders/ (or your IDA/loaders/) directory, launch IDA, and open a decrypted iBoot or iBEC binary image.
This aims to become an IDAPython utility to help with iBoot64 reverse engineering. Currently it just locates iBoot's proper loading address, rebases the image, and identifies ARM64 functions based on a common function prologue. As you can see in the screenshot below, 1451 functions are recognized after running it on iBoot version 4513.260.81.
It's not much at this point, but hopefully it can help you start reversing the beast ;)
I will be adding features to it, like function renaming based on string usage, etc.