
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
rubicon-objc
Advanced tools
.. |logo| image:: https://beeware.org/project/utilities/rubicon/rubicon.png :width: 72px :target: https://beeware.org/rubicon
.. |pyversions| image:: https://img.shields.io/pypi/pyversions/rubicon-objc.svg :target: https://pypi.python.org/pypi/rubicon-objc :alt: Python Versions
.. |version| image:: https://img.shields.io/pypi/v/rubicon-objc.svg :target: https://pypi.python.org/pypi/rubicon-objc :alt: Project Version
.. |maturity| image:: https://img.shields.io/pypi/status/rubicon-objc.svg :target: https://pypi.python.org/pypi/rubicon-objc :alt: Project status
.. |license| image:: https://img.shields.io/pypi/l/rubicon-objc.svg :target: https://github.com/beeware/rubicon-objc/blob/main/LICENSE :alt: License
.. |ci| image:: https://github.com/beeware/rubicon-objc/workflows/CI/badge.svg?branch=main :target: https://github.com/beeware/rubicon-objc/actions :alt: Build Status
.. |social| image:: https://img.shields.io/discord/836455665257021440?label=Discord%20Chat&logo=discord&style=plastic :target: https://beeware.org/bee/chat/ :alt: Discord server
|logo|
|pyversions| |version| |maturity| |license| |ci| |social|
Rubicon-ObjC is a bridge between Objective-C and Python. It enables you to:
It also includes wrappers of the some key data types from the Foundation
framework (e.g., NSString).
Want to jump in and get started? We have a hands-on tutorial for beginners <https://rubicon-objc.readthedocs.io/en/latest/tutorial/index.html>__.
Looking for guidance on how to solve a specific problems? We have how-to guides and recipes <https://rubicon-objc.readthedocs.io/en/latest/how-to/index.html>__
for common problems and tasks, including how to contribute.
Just want the raw technical details? Here's our Technical reference <https://rubicon-objc.readthedocs.io/en/latest/reference/index.html>__.
Looking for explanations and discussion of key topics and concepts?
Our background <https://rubicon-objc.readthedocs.io/en/latest/background/index.html>__
guides may help.
Rubicon is part of the BeeWare suite <https://beeware.org>__. You can talk to
the community through:
@beeware@fosstodon.org on Mastodon <https://fosstodon.org/@beeware>__
Discord <https://beeware.org/bee/chat/>__
The Rubicon-ObjC Github Discussions forum <https://github.com/beeware/rubicon-objc/discussions>__
The BeeWare community has a strict Code of Conduct <https://beeware.org/community/behavior/>__. All users and developers are
expected to adhere to this code.
If you have any concerns about this code of conduct, or you wish to report a
violation of this code, please contact the project founder Russell Keith- Magee <mailto:russell@beeware.org>__.
If you experience problems with Rubicon-ObjC, log them on GitHub <https://github.com/beeware/rubicon-objc/issues>__.
If you'd like to contribute to Rubicon-ObjC development, our contribution guide <https://rubicon-objc.readthedocs.io/en/latest/how-to/contribute/index.html>__
details how to set up a development environment, and other requirements we have
as part of our contribution process.
FAQs
A bridge between an Objective C runtime environment and Python.
We found that rubicon-objc demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.