Need help with iGoat-Swift?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

249 Stars 71 Forks GNU General Public License v3.0 119 Commits 10 Opened issues


OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS

Services available


Need anything else?

Contributors list

GSOC 2019

OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS Twitter Follow

This is a Swift version of original iGoat Objective C project. Using OWASP iGoat, you can learn exploiting and defending vulnerabilities in iOS Swift applications. Developed using Swift 4 Ruby

iGoat (Objective C) was presented at: AppSec USA 2017   c0c0n 2017   SEC-T 2017   BruCON 2017   Bugcrowd Levelup 2017

Vulnerabilities Covered (version 1.0): Download iGoat Documentation:


OWASP TOP 10 Mobile

* Reverse Engineering* Runtime Analysis* Data Protection (Rest)* Data Protection (Transit)* Key Management* Tampering* Injection Flaws* Broken Cryptography* Memory Management* URL Scheme Attack* Social Engineering* SSL Pinning* Authentication* Jailbreak Detection* Side Channel Data Leaks* Cloud Misconfiguration* Crypto Challenges



Documentation: iGoat Wiki

iGoat Quick Setup

git clone
and open iGoat-Swift.xcodeproj with xcode. Setup iGoat Server Navigate to server > dockerpackaging and then use command
docker compose up

Using Cydia Repo__ - Open Cydia -> Sources -> Edit and add source and then search for iGoat and install it.

Project Lead - Swaroop Yermalkar Twitter Follow

Lead Developer - Anthony Gonsalves



How to Contribute?

  • You can add new exercises
  • Testing iGoat and checking if any issues
  • Suggest us new attacks
  • Writing blogs / article about iGoat
  • Spreading iGoat :)

To contribute to iGoat project, please contact Swaroop ( [email protected] or @swaroopsy )

Project Contributors -

Junard Lebajan
Your name can be here :) We give cool iGoat t-shirt and swag!

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.