<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Objective-C on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/objective-c/</link><description>Recent content in Objective-C on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/objective-c/feed.xml" rel="self" type="application/rss+xml"/><item><title>EggShell</title><link>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EggShell is a post-exploitation surveillance tool developed in Python, designed for establishing command line sessions on target machines with extended functionalities. Notable features include file uploading/downloading, tab completion, command execution, photo capturing, and device location tracking, with enhanced security through SSL and support for Linux and iOS in version 3.0.0. This tool serves as a proof of concept for penetration testing on devices that users own.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="eggshell"&gt;&lt;a href="http://lucasjackson.io/eggshell"&gt;EggShell&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="about"&gt;About&lt;/h2&gt;
&lt;p&gt;EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own.&lt;/p&gt;</description></item><item><title>IPAPatch</title><link>https://rainmana.github.io/hackyfeed/tools/naituw-ipapatch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/naituw-ipapatch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IPAPatch is a tool designed for patching iOS applications without the need for jailbreaking, enabling developers to inject custom code into third-party IPA files. Key features include the ability to debug applications using lldb, link external frameworks seamlessly, and generate modified distributable IPA files, allowing easy sharing of customized applications. This tool is particularly useful for developers looking to manipulate app behavior or integrate additional functionality within existing iOS apps.&lt;/p&gt;</description></item><item><title>MonkeyDev</title><link>https://rainmana.github.io/hackyfeed/tools/alonemonkey-monkeydev/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alonemonkey-monkeydev/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MonkeyDev is an enhanced version of iOSOpenDev designed for non-jailbroken iOS plugin development. It allows developers to easily create and inject tweaks using Xcode, offering support for CaptainHook and Logos, as well as providing tools for debugging and patching apps without jailbreaking. Notable features include automatic integration of class-dump, restore-symbol, and Reveal, as well as a private CocoaPods repository for managing non-jailbroken plugins.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="monkeydev"&gt;MonkeyDev&lt;/h1&gt;
&lt;p&gt;A modified version of iOSOpenDev&lt;/p&gt;</description></item><item><title>ssl-kill-switch2</title><link>https://rainmana.github.io/hackyfeed/tools/nabla-c0d3-ssl-kill-switch2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nabla-c0d3-ssl-kill-switch2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SSL Kill Switch 2 is a blackbox tool designed to disable SSL/TLS certificate validation, including certificate pinning, in iOS and macOS applications. This tool modifies low-level functions managing SSL/TLS connections to bypass the system&amp;rsquo;s default validation, enabling man-in-the-middle attacks on SSL or HTTPS traffic. It supports installation as a Cydia Substrate tweak on jailbroken iOS devices and can be injected as a dynamic library into macOS applications for similar functionality.&lt;/p&gt;</description></item></channel></rss>