diff --git a/Module-1/README.md b/Module-1/README.md index c0cc98c..a3bd18c 100644 --- a/Module-1/README.md +++ b/Module-1/README.md @@ -16,7 +16,7 @@ _Note: If you need help jailbreaking your device, there are many resources onlin sudo pip install frida-tools ``` - Download the latest version of [Bettercap](https://www.bettercap.org/installation/): Bettercap will allow you to perform MitM attacks remotely to a device. -- Download the latest version of [class-dump-z](https://code.google.com/archive/p/networkpx/downloads): class-dump-z will allow you to dump Objc classes. There's a Swift version but you won't needed since my vulnerable app is written in Objc. +- Download the latest version of [class-dump-z](https://code.google.com/archive/p/networkpx/downloads): class-dump-z will allow you to dump Objc classes. There's a Swift version but you won't need it since my vulnerable app is written in Objc. - Download the latest version of [momdec](https://github.com/atomicbird/momdec): momdec will allow you to decompile CoreData models. - Download the latest version of [Ghidra](https://ghidra-sre.org/): Ghidra is another reverse engineering tool, which will let you do some of the same tasks as Hopper. ##### If your device is on iOS 10.x