diff --git a/.DS_Store b/.DS_Store deleted file mode 100644 index 29c42f4..0000000 Binary files a/.DS_Store and /dev/null differ diff --git a/.gitignore b/.gitignore index 7801c93..fd1dc16 100644 --- a/.gitignore +++ b/.gitignore @@ -66,3 +66,4 @@ fastlane/test_output # https://github.com/johnno1962/injectionforxcode iOSInjectionProject/ +/.DS_Store diff --git a/README.md b/README.md index 602f32e..99f8555 100644 --- a/README.md +++ b/README.md @@ -2,13 +2,15 @@ Decrypts FairPlay applications on iOS 13.4.1 and lower, no jb required +![Example](media/img.png) + This application uses [@s1guza](https://twitter.com/s1guza)'s [Psychic Paper](https://siguza.github.io/psychicpaper/) exploit to be able to read other process memory and the iOS filesystem. -Many alternatives already exist ([origina?](https://github.com/stefanesser/dumpdecrypted), [Frida version](https://github.com/AloneMonkey/frida-ios-dump), [past favorite](https://github.com/BishopFox/bfdecrypt)). This was written primarily for a case where I want to get a decrypted IPA from a GUI without SSH'ing into a jb'd device. +Many alternatives already exist ([original?](https://github.com/stefanesser/dumpdecrypted), [Frida version](https://github.com/AloneMonkey/frida-ios-dump), [past favorite](https://github.com/BishopFox/bfdecrypt)). This was written primarily for a case where I want to get a decrypted IPA from my iOS device and Airdrop it to a computer ## Compile Change around the Singing identity and build for an iOS 13.4.1 or lower device. If successful, you'll see the list of GUI applications on your iOS device. ## Usage -First launch a 3rd party application, then decrypt it from the yacd app \ No newline at end of file +First, launch a 3rd party application, then decrypt it from the yacd app. Have a receiving computer with Airdrop available nearby. diff --git a/media/img.png b/media/img.png new file mode 100644 index 0000000..9aa06df Binary files /dev/null and b/media/img.png differ