/

Getting started with Monitor on iOS

An autonomous security agent that lives inside your iOS application, with full visibility into runtime state, device integrity, and application behavior.

An autonomous security agent that lives inside your iOS application, detecting and responding to threats in real-time with full visibility into device state, runtime behavior, and application integrity.


What is ByteHide Monitor?

Your iOS application runs on devices you do not control. Attackers use jailbreak tools, debuggers, hooking frameworks, and MITM proxies to analyze and manipulate your application directly. Traditional perimeter security cannot help here because there is no perimeter.

ByteHide Monitor is an autonomous security agent that runs inside your application as a parallel process, with full visibility into the runtime environment. It detects reverse engineering attempts, jailbroken devices, memory dumping, process injection, network tampering, and integrity violations. Because it operates inside the application, it can detect threats that no external tool can see, including zero-day techniques using behavioral analysis rather than signature matching.

Key characteristics:

  • Auto-Initialization: Activates before main() via Objective-C +load() method
  • Swift and Objective-C: Full support for both languages
  • CocoaPods and SPM: Install via CocoaPods or Swift Package Manager
  • Zero Code Required: Cloud configuration mode requires no code changes

Quick Start

Quick Start

Get Monitor running in under 5 minutes with zero-config cloud setup

CocoaPods / SPM

Install via CocoaPods or Swift Package Manager

Configuration API

Cloud, JSON, and programmatic configuration options

Protection Modules

14 runtime protections for mobile threat detection


Available Protections

Monitor detects and prevents threats in real-time on iOS devices:

ProtectionDescription
Debugger DetectionDetect LLDB, Frida, and instrumentation tools
Jailbreak DetectionDetect Cydia, Sileo, checkra1n, unc0ver
Simulator DetectionIdentify iOS Simulator environments
Tampering DetectionVerify IPA signature and bundle integrity
Clock TamperingDetect system time manipulation
Memory Dump DetectionDetect memory scanning and dumping tools
Process InjectionDetect DYLD_INSERT_LIBRARIES and code injection
Network TamperingIdentify MITM proxies (Charles, Burp Suite) and VPN tampering
Hardware BindingBind sessions to specific device hardware fingerprints
Screen Recording DetectionDetect screen recording, AirPlay mirroring, and ReplayKit
Screenshot DetectionDetect screenshot capture events
Overlay DetectionDetect UI overlays and tapjacking attacks
Library Injection DetectionDetect Frida, Substrate, and unauthorized dylib injection
Keychain Integrity DetectionDetect certificate injection and MITM proxy certificates

How It Works

  1. Add the Dependency: Install via CocoaPods or Swift Package Manager
  2. Configure Your Token: Set the ByteHide project token
  3. Configure Protections: Use cloud dashboard, JSON file, or programmatic API
  4. Deploy: Monitor auto-initializes at runtime and enforces protections
  5. Monitor: View incidents, devices, and sessions from the cloud panel

Changes made in the dashboard take effect without rebuilding your app.