8000 GitHub - AbdulrahmanALHakami/iWare-v1
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

AbdulrahmanALHakami/iWare-v1

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

iWare – iOS APT SpyWare Simulation App

iWare is an educational simulation app designed to mimic the behavior of advanced surveillance software on iOS devices. It is not intended for malicious use, but rather as a tool for cybersecurity researchers, digital forensic analysts, and reverse engineers to better understand how spyware may behave on iOS platforms.


Project Purpose

  • Demonstrate how a mobile surveillance app may operate.
  • Simulate data exfiltration techniques used in targeted malware.
  • Provide a controlled testing environment for analyzing behavioral patterns.
  • Allow researchers to observe forensic artifacts and analyze application activity.

How It Works (Conceptually)

  1. User Inputs C2 Information:

    • The user provides the attacker's IP and port via the app interface.
  2. Triggering Surveillance:

    • When the user presses “Start Attack,” the app begins collecting simulated surveillance data:
      • Microphone recording
      • Photo library images
      • Contact list entries
      • (Optionally) a photo taken via the device’s camera
  3. Data Transmission:

    • All gathered data is sent to a user-defined remote server (C2), simulating how spyware may exfiltrate information.

Legal & Ethical Notice

This application is intended strictly for lawful, educational, and ethical research purposes only. Any misuse of this application is solely the responsibility of the end user.


© 2025 Abdulrahman Al-Hakami – All rights reserved.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0