DerekSelander / yacd

Decrypts FairPlay applications on iOS 13.4.1 and lower, no jb required

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

yacd (Yet Another Code Decrypter)

Decrypts FairPlay (App Store) applications on iOS 13.4.1 and lower, no jb required

Use for research purposes only, I didn't publish this for you to sideload Fortnite

TLDR: build & run

> xcodebuild -project ./PsychicStapler.xcodeproj  -scheme yacd -config Debug -sdk iphoneos -arch arm64 -derivedDataPath /tmp/
# upload to jb'd device, refresh UICache
# open an app, open yacd, decrypt

This application uses @s1guza's Psychic Paper exploit to be able to read other process memory and the iOS filesystem.

Many alternatives already exist (original?, Frida version, past favorite). This was written primarily for a case where I want to get a decrypted IPA from my iOS device and Airdrop it to a computer

Compile

You'll need Xcode 12 for the xcproject

Change around the Singing identity and build for an iOS 13.4.1 or lower device. If successful, you'll see the list of GUI applications on your iOS device.

Usage

First, launch a 3rd party application, then decrypt it from the yacd app (the app whose icon contains GQ's sexiest man of 2020). Have a receiving computer with Airdrop available nearby.

Credits

If you make derivatives of this, cite your sources

About

Decrypts FairPlay applications on iOS 13.4.1 and lower, no jb required

License:MIT License


Languages

Language:C 58.5%Language:Objective-C 37.0%Language:Objective-C++ 3.2%Language:C++ 1.2%