iWare is an educational simulation app designed to mimic the behavior of advanced surveillance software on iOS devices. It is not intended for malicious use, but rather as a tool for cybersecurity researchers, digital forensic analysts, and reverse engineers to better understand how spyware may behave on iOS platforms.
- Demonstrate how a mobile surveillance app may operate.
- Simulate data exfiltration techniques used in targeted malware.
- Provide a controlled testing environment for analyzing behavioral patterns.
- Allow researchers to observe forensic artifacts and analyze application activity.
-
User Inputs C2 Information:
- The user provides the attacker's IP and port via the app interface.
-
Triggering Surveillance:
- When the user presses “Start Attack,” the app begins collecting simulated surveillance data:
- Microphone recording
- Photo library images
- Contact list entries
- (Optionally) a photo taken via the device’s camera
- When the user presses “Start Attack,” the app begins collecting simulated surveillance data:
-
Data Transmission:
- All gathered data is sent to a user-defined remote server (C2), simulating how spyware may exfiltrate information.
This application is intended strictly for lawful, educational, and ethical research purposes only. Any misuse of this application is solely the responsibility of the end user.
© 2025 Abdulrahman Al-Hakami – All rights reserved.