Decrypts FairPlay (App Store) applications on iOS 13.4.1 and lower, no jb required
TLDR: build & run
> xcodebuild -project ./PsychicStapler.xcodeproj -scheme yacd -config Debug -sdk iphoneos -arch arm64 -derivedDataPath /tmp/
# upload to jb'd device, refresh UICache
# open an app, open yacd, decrypt
This application uses @s1guza's Psychic Paper exploit to be able to read other process memory and the iOS filesystem.
Many alternatives already exist (original?, Frida version, past favorite). This was written primarily for a case where I want to get a decrypted IPA from my iOS device and Airdrop it to a computer
You'll need Xcode 12 for the xcproject
Change around the Singing identity and build for an iOS 13.4.1 or lower device. If successful, you'll see the list of GUI applications on your iOS device.
First, launch a 3rd party application, then decrypt it from the yacd app (the app whose icon contains GQ's sexiest man of 2020). Have a receiving computer with Airdrop available nearby.
- @s1guza's already mentioned Psychic Paper
- @rodionovme's liblorgnette as a starting point
- https://github.com/ZipArchive/ZipArchive
- https://github.com/SVProgressHUD/SVProgressHUD
If you make derivatives of this, cite your sources