ipsw

Community

Reverse engineer Apple firmware with ipsw.

Authorblacktop
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill provides a guided, automated workflow for analyzing Apple firmware and binaries by enabling streamlined acquisition, inspection, and analysis of IPSWs, kernelcaches, dyld_shared_cache, entitlements, and Mach-O data for iOS/macOS security research.

Core Features & Use Cases

  • Firmware acquisition: Download the latest IPSWs and extract components such as kernelcaches and dyld_shared_cache for quick RE workflows.
  • Userspace analysis: Inspect the dyld_shared_cache, perform symbol lookups, cross-references, string searches, and ObjC header extraction from private frameworks.
  • Mach-O & kernel exploration: Analyze Mach-O binaries, inspect entitlements, inspect code signatures, and examine kernel/KEXT data across versions.
  • Entitlements research: Build and query entitlement data across IPSWs to identify privilege escalations and sandbox configurations.
  • Use Case: In vulnerability triage, fetch the latest device firmware, inspect the DSC, and verify private API surfaces and entitlements across builds.

Quick Start

Install the ipsw CLI and run a basic workflow to fetch kernel and DSC data for a device, for example: ipsw download ipsw --device iPhone16,1 --latest --kernel --dyld

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: ipsw
Download link: https://github.com/blacktop/ipsw-skill/archive/main.zip#ipsw

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.