<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://jotals3.github.io/</id><title>jotals3</title><subtitle>Blog for cybersecurity and privacy enthusiasts.</subtitle> <updated>2026-04-10T20:39:18+02:00</updated> <author> <name>jotals3</name> <uri>https://jotals3.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://jotals3.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://jotals3.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 jotals3 </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>0x02: Getting started in iOS Security Research using vphone-cli - Solving Challenges</title><link href="https://jotals3.github.io/posts/0x02-ios-security-research-vphone/" rel="alternate" type="text/html" title="0x02: Getting started in iOS Security Research using vphone-cli - Solving Challenges" /><published>2026-04-10T00:00:00+02:00</published> <updated>2026-04-10T20:38:45+02:00</updated> <id>https://jotals3.github.io/posts/0x02-ios-security-research-vphone/</id> <content type="text/html" src="https://jotals3.github.io/posts/0x02-ios-security-research-vphone/" /> <author> <name>jotals3</name> </author> <category term="ios-security" /> <summary>For this second post about getting started in iOS security research, we will use the already configured environment to solve some arm64 exploitation challenges. Playing around with the virtualized iPhone We will use our virtualized iPhone to solve some simple arm64 exploitation exercises extracted from the 8ksec.io blog posts. Before getting started… Before starting with the challenges, we ...</summary> </entry> <entry><title>0x01: Getting started in iOS Security Research using vphone-cli - Environment Setup</title><link href="https://jotals3.github.io/posts/0x01-ios-security-research-vphone/" rel="alternate" type="text/html" title="0x01: Getting started in iOS Security Research using vphone-cli - Environment Setup" /><published>2026-04-09T00:00:00+02:00</published> <updated>2026-04-10T20:38:45+02:00</updated> <id>https://jotals3.github.io/posts/0x01-ios-security-research-vphone/</id> <content type="text/html" src="https://jotals3.github.io/posts/0x01-ios-security-research-vphone/" /> <author> <name>jotals3</name> </author> <category term="ios-security" /> <summary>For this first post about getting started in iOS security research, we will take advantage of the vphone-cli project in order to run a fully virtualized iPhone on top of apple silicon chips, and set up some useful tools for security research. Note: To follow the steps described in this post, you will need access to an Apple machine with an Apple Silicon processor, otherwise you won’t be abl...</summary> </entry> <entry><title>0x00: Hello World</title><link href="https://jotals3.github.io/posts/0x00-initial-post/" rel="alternate" type="text/html" title="0x00: Hello World" /><published>2026-02-08T00:00:00+01:00</published> <updated>2026-02-08T00:00:00+01:00</updated> <id>https://jotals3.github.io/posts/0x00-initial-post/</id> <content type="text/html" src="https://jotals3.github.io/posts/0x00-initial-post/" /> <author> <name>jotals3</name> </author> <category term="helloworld" /> <summary>Hello world! Why? The main objective of this blog will be to post mainly about cybersecurity research and keep track of some interesting things that I’m working on right now. What? I am currently diving into the world of mobile security, so the focus will be on application vulnerability research and reverse engineering, both for the Android and iOS platforms (I hope!). I will also share som...</summary> </entry> </feed>
