Tuesday 30 August 2022

Jailed_Support [sideload detection + tweak detection bypass]

After months of hard work iv finished jailed_support Project GitHub: https://ift.tt/ViGjAHU What it dose: - It hooks objective functions + exported functions that are currently active it dose not make use of substrate. Features: - Bundle ID check bypass - Dylib files check bypass - Malicious checks bypass checking hashes changes etc - Supports jailbroken devices somewhat(w.i.p) what games dose it support: - Supports all games Some good to know info: - although this is very helpful to bypass jailed detections some games have gone to very extreme to crack down on methods used here. - you might have to bypass a few detections manually than use this. Usage: void setup(){ support_init(); if(support_initialized()){ struct support_bypass bypass = { NULL, /* custom uniuque id to spoof app no use for now */ "com.rednick16.jailed.example", /* your app bundle id most basic detection but effective */ { /* add any files u wish to bypass here */ "embedded", "mobileprovision", "jailed_example", "libsupport" }, { /* add any symbols u wish to bypass here */ "example_symbol", "MSHookFunction", "MSHookMessage" } }; initilize(bypass); } Project GitHub: https://ift.tt/ViGjAHU Installation: - your tweak + libsupport needs to be added to frameworks folder - If your jailbroken you can add it to bin or compile it into a deb but it’s really made for non jailbroken devices Credits: @Red

from iOSGods RSS Feed https://ift.tt/dN7LMb9

No comments:

Post a Comment