Cyber-Ifrit Security Academy (CISA)

Elevate Your Research to the Hades-Tier.

Master the depths of Darwin kernels, hardware virtualization, and full-stack iOS pentesting. We provide the tools; you provide the curiosity.

🚀 Genesis 100 Bonus: All Pioneer License holders receive 1 Free Certification Attempt for the CMRA or CAPS tracks as part of their supporter pass.

CMRA: Certified Mobile Research Architect

Infrastructure & Virtualization.

Core Modules

  • Building the STYX Hypervisor environment.
  • PCCVRE Firmware Analysis & Handshakes.
  • Low-level C++ Hardware Abstraction.

Goal: For engineers who want to build their own research nodes and emulators.

CAPS: Certified ACHERON Pentesting Specialist

Offense & Application Auditing.

Perform deep-app audits on Windows/Linux with zero hardware friction.

Core Modules

  • Bypassing WAFs and Root/Jailbreak Detection.
  • Dynamic Instrumentation with Frida on ACHERON.
  • Phonycode CLI for Automated IPA Auditing.

Goal: For Pentesters and Bug Bounty Hunters on Parrot OS.

CDKD: Certified Darwin Kernel Developer

The XNU Kernel & Exploitation.

Core Modules

  • Reverse Engineering the XNU Kernel.
  • Identifying Memory Corruption & UAF.
  • Developing PoC exploits in virtualized sandboxes.

Goal: For elite exploit researchers and systems engineers.

🛡️ Track 2: CAPS Specialization

Full-Stack iOS Application Security & Auditing. We break the syllabus down into "Real-World" attack vectors that pentesters face every day on Windows/Linux environments.

Burp Suite
Frida
Phonycode

Module 1: Static Analysis & Ingestion

  • Phonycode Mastery (.ipa ingestion)
  • Binary Protections Audit (PIE, ARC)
  • Sideloading Logic (.dylib injection)

Module 2: Bypassing Client Protections

  • Jailbreak Detection Bypass
  • SSL Pinning Bypass via Frida
  • Anti-Debugging (ptrace) Defeat

Module 3: Dynamic Analysis & API Security

  • Traffic Interception (Burp/ZAP)
  • Sensitive Data Storage Audit
  • Business Logic Testing
System Live ID: CISA-CAPS-LAB

The Final Descent

24-Hour Remote Lab Access Exam

23:59:59 Time Remaining

Objective: Submit a comprehensive "Pentest Report" with 4 captured flags within the 24-hour window.

Schedule Attempt

Genesis 100 supporters receive 1 free attempt

> INITIALIZING LAB... > MOUNTING ACHERON_DISK_VRE... > ATTACHING FRIDA_SERVER... > LOADING UNICORN_ENGINE... > SYSTEM_STATUS: STABLE > SECURITY_LEVEL: HADES > LOGGING_START: 2026-03-20T11:11:16.117Z

đźš© Exam Structure & Objectives

The CAPS certification proves you can work a high-speed Linux-to-iOS pipeline under pressure.

#01

Ingestion & Static Analysis

10 Points

The Task

Use Phonycode CLI to ingest 'VulnerableApp.ipa' into an ACHERON node.

The Goal

Extract Info.plist, identify hardcoded API keys and misconfigured URL schemes.

#02

Defeating Client-Side Shields

30 Points

The Task

The app has 'Hades-Gate' root detection and SSL pinning enabled.

The Goal

Use STYX settings or Frida to bypass detection and reach the login screen.

#03

Dynamic Data Interception

30 Points

The Task

Route ACHERON node's traffic through Burp Suite.

The Goal

Intercept obfuscated JSON and perform an IDOR attack to view profiles.

#04

The 'Final Boss'

30 Points

The Task

Identify memory corruption in a custom C++ module via ACHERON logs.

The Goal

Craft a simple PoC crash or extract a 'Secret String' from live memory logs.

Certification Result: Verified Pioneer

Upon submission of your Pentest Report, receive a unique Digital Badge, Verifiable ID (CISA-CAPS-2026-XXX), and "Ifrit-Prime" status on our global researcher directory.

Development Track

CDAD: Certified ACHERON Apple Developer

For the "Windows-based iOS Developer" who wants to build high-performance products without the hardware overhead.

01

Module 1: The STYX Dev Environment

  • • Environment Parity: Setting up ACHERON nodes to mirror specific iPhone hardware (iPhone 15 Pro vs. iPhone 17).
  • • Phonycode Bridge: Connecting Flutter/React Native to the STYX engine for sub-second hot reloads.
  • • C++ Foundation: Understanding how the STYX HAL translates Darwin system calls to Windows/Linux.
02

Module 2: High-Fidelity UI/UX Testing

  • • GPU Acceleration: Optimizing Metal-to-Vulkan/DirectX translation for smooth 60fps animations.
  • • Sensor Simulation: Testing CoreLocation (GPS), Accelerometer, and Haptics via the Phonycode CLI.
  • • Dark Mode & Dynamic Type: Automated testing across all iOS system states within the virtual node.
03

Module 3: The 'Final Mile' Pipeline

  • • Pre-Flight Auditing: Using ACHERON to run a 'Mock App Store Review' to find common rejection triggers.
  • • CI/CD Integration: Setting up automated 'headless' ACHERON nodes for GitHub Actions or GitLab CI.
  • • Handoff Workflow: The legal and technical steps for moving an ACHERON-validated build to a Mac for final signing.

Enrollment Benefit

"The Genesis 100 License includes the full CDAD Toolchain—making it the only license in the world that lets you develop for iOS on Windows with professional-grade hardware simulation."

phonycode_doctor.sh — 80x24
$ phonycode doctor --target-node acheron-v2.4.1
[âś“] STYX Hypervisor: Version 3.1.2 Running
[âś“] ACHERON Node: iPhone 15 Pro Found (DFU_MODE)
[âś“] Flutter Bridge: SDK 3.16.5 Connected
[âś“] React Native Bridge: CLI 12.1.3 Connected
[!] Warning: Graphics acceleration is currently set to Vulkan.
Switching to Turbo-Compile Mode (JIT)...
Running 'hot-reload' test...
SUCCESS: Bridge established in 412ms.

The 2026 App Store Readiness Checklist

From Windows to the App Store. A 40-point technical guide to ensuring your ACHERON-built apps pass Apple review on the first try.

Included as a Premium Asset for Genesis 100 Pioneers.

Verify Credential

Are you an employer or a security firm? Verify real-world research credentials here.

Verified by STYX Proof-of-Research XNU Certified

Support the Future of Security Research & Development

Join the Genesis 100. Be among the first to support the STYX Framework and receive exclusive access to early ACHERON Pro features and priority support.

Hardware Democratization starts here.