Swizzler was built as a tool to help analyze MDM/EMS iOS applications, it has grown to incorporate other features to assist and ease the job of penetration testers and security researchers in the security analysis of any iOS application.
This tool was release along side the BlackHat presentation entitled Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions.
Full Presentation, White Paper and Video Recording can be found at https://www.blackhat.com/us-16/briefings.html#bad-for-enterprise-attacking-byod-enterprise-mobile-security-solutions
Everything here is in a beta stage and stuff maybe unstable.
Swizzler is being updated to v2 which will make use of Frida and will allowing targeting of applications on non-jailbroken devices. More on it at Swizzler2
GNU GPLv3
- Download the latest binary release from https://github.com/vtky/Swizzler/releases
- Upload to iOS device and run the following command:
dpkg -i me.vtky.swizzler_0.1.0-1_iphoneos-arm.deb
- X Code
- Theos Framework (https://github.com/rpetrich/theos)
- Symlink theos to the swizzler directory
- Port forward iOS device SSH to local port
- ./tcprelay.py -t 22:2222
source setup.sh
- make package install
Please refer to the Usage document
Create an issue here or tweet me @vincent_tky