Practices
The first 3 parts of this book have introduced the concepts, tools and theories of iOS reverse
engineering, along with examples to give you a better understanding of them. I believe you
have the same feeling that only if concepts, tools and theories are combined together can we get
the best out reverse engineering.
So far, you may still feel unsatisfied with the fragmented and conservative examples. So in
this part, we’ve prepared 4 original and serialized examples to show you the combination of
concepts, tools and theories. They are:
- Characount for Notes 8
- Mark user specific emails as read automatically^
- Save and share Sight in WeChat
-^ Detect and send iMessage
Now, welcome to the most splendid part of this book. Let’s enjoy the art of iOS reverse
engineering!
IV