macmade / aeota

AEA OTA/IPSW decryption

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

aeota

AEA OTA/IPSW decryption

get_key.py

Gets a key from an AEA (non OTA; for OTAs, use the key that is provided with your response).

pip3 install -r requirements.txt
python get_key.py <path to AEA>

Decrypting/extracting an AEA

Non-OTAs (IPSWs)

ie. 090-34187-052.dmg.aea

aea decrypt -i <path to AEA> -o <decrypted output file> -key-value 'base64:<key in base64>'

OTAs

make
./aastuff <path to AEA> <output folder> <key in base64>

Related Projects

Credits

  • Siguza - auth data parsing strategy
  • Nicolas - original HPKE code
  • Snoolie - auth data parsing strategy
  • Flagers - AppleArchive assistance

About

AEA OTA/IPSW decryption


Languages

Language:Objective-C 65.9%Language:Python 31.2%Language:Makefile 2.9%