diff --git a/README.md b/README.md index 84c89b4..602f32e 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,14 @@ -# yacd +# yacd (Yet Another Code Decrypter) + Decrypts FairPlay applications on iOS 13.4.1 and lower, no jb required + +This application uses [@s1guza](https://twitter.com/s1guza)'s [Psychic Paper](https://siguza.github.io/psychicpaper/) exploit to be able to read other process memory and the iOS filesystem. + +Many alternatives already exist ([origina?](https://github.com/stefanesser/dumpdecrypted), [Frida version](https://github.com/AloneMonkey/frida-ios-dump), [past favorite](https://github.com/BishopFox/bfdecrypt)). This was written primarily for a case where I want to get a decrypted IPA from a GUI without SSH'ing into a jb'd device. + + +## Compile +Change around the Singing identity and build for an iOS 13.4.1 or lower device. If successful, you'll see the list of GUI applications on your iOS device. + +## Usage +First launch a 3rd party application, then decrypt it from the yacd app \ No newline at end of file