Skip to content

boydcase31/Decrypt0r

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 

Repository files navigation

#Decrypt0r

###Rootfs decrypting

To decrypt rootfs or other components you have to get keys from https://www.theiphonewiki.com/wiki/Firmware_Keys.

You have to enter the IPSW filename (ex : iPhone5,4_8.4.1_12H321_Restore.ipsw).
The program will ask you to add the keys grabed from iphonewiki (only one for the rootfs).

Then, the tool will decompress you'll have to add the rootgs name
Next you have specify the name of the file containing rootfs (ex 058-24465-023.dmg).
In the IPSW file, there is three dmg files, that of rootfs is heaviest.

Then the program is going to work automaticaly.

If you want to modify rootfs (ex Setup.app) you can use TransMac for Windows.

Encryption of rootfs and creating a Custom fimware

You can now create your own Custom fimware (need to work more).
Downgrades are already impossible without SHSHs blobs, on devices that do not have low level exploits.
Is this fonction useless ?
Yes, but it can still be used.

#Other components

To decrypt other firmware components like kernelcache or iBoot, you have to grab the keys from theiphonewiki
The first one to add is the largest, and the second one is the iv key (the smallest)

How to build ?

To build Decrypt0r just cd to the decryptr0r directory and run make

TODO

  • Work the improve custom firmwares

Credits

Thank you to my friend Jam Elrhk Elro (@Elro74) for his Liberati0n script and help for dev.
Developed by Mathieu Hautebas (@matteyeux)
Thank you to Callum Jones for his awesome website ipsw.me and Neal (@iNeal) for his API.

For this tool I used:

For more informations contact me on Twitter: @matteyeux or ask this awesome website

About

xpwn & dmg CLI

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 80.3%
  • Shell 13.7%
  • Makefile 6.0%