iBoot64helper is now an IDA loader!
Just copy iBoot64helper.py to your ~/.idapro/loaders/ (or your IDA/loaders/) directory, launch IDA, and open a decrypted iBoot or iBEC (or SecureROM) binary image.
This aims to become an IDAPython utility to help with iBoot64 reverse engineering. Currently it a) locates iBoot's proper loading address, b) rebases the image, c) identifies ARM64 functions based on a common function prologue, and d) finds and renames some interesting functions.
As you can see in the screenshot below, 1920 functions are recognized after running it on iBoot version 5540.0.129.
It's not much at this point, but hopefully it can help you start reversing the beast ;)
I will be adding features to it, identifying more functions, etc.