![logo](images/logo.jpg)
---
[![GitHub stars](https://img.shields.io/github/stars/LaurieWired/iOS_Reverse_Engineering)](https://github.com/LaurieWired/iOS_Reverse_Engineering/stargazers)
[![GitHub forks](https://img.shields.io/github/forks/LaurieWired/iOS_Reverse_Engineering)](https://github.com/LaurieWired/iOS_Reverse_Engineering/network/members)
[![GitHub contributors](https://img.shields.io/github/contributors/LaurieWired/iOS_Reverse_Engineering)](https://github.com/LaurieWired/iOS_Reverse_Engineering/graphs/contributors)
[![Follow @lauriewired on Twitter](https://img.shields.io/twitter/follow/lauriewired?style=social)](https://twitter.com/lauriewired)
🔍 Dive into the World of iOS Reverse Engineering! 🚀
Dive deep into the heart of iOS with this comprehensive guide to reverse engineering. From beginners to experts, there's something for everyone!
📚 Explore the wiki!: The Comprehensive iOS RE Wiki contains guides and information for kickstarting your iOS reverse engineering!
📱 Example IPA Files: Example iOS IPA files showcase various obfuscation techniques.
🛠️ Ghidra Scripts: Speed up your iOS RE journey with custom Ghidra scripts.
Join the community and help evolve the landscape of iOS Reverse Engineering. I will continue to add information to this repository for more iOS Reverse Engineering assistance! 🌟