Skip to content

Instantly share code, notes, and snippets.

View kasiimh1's full-sized avatar

Kasim Hussain kasiimh1

  • United Kingdom
View GitHub Profile
@kasiimh1
kasiimh1 / spotihosts
Created September 22, 2018 11:59
The hosts file entries to block Spotify audio ad servers.
127.0.0.1 media-match.com
127.0.0.1 adclick.g.doublecklick.net
127.0.0.1 www.googleadservices.com
127.0.0.1 open.spotify.com
127.0.0.1 pagead2.googlesyndication.com
127.0.0.1 desktop.spotify.com
127.0.0.1 googleads.g.doubleclick.net
127.0.0.1 pubads.g.doubleclick.net
127.0.0.1 audio2.spotify.com
127.0.0.1 www.omaze.com
Kasims-MacBook-Pro:~ kasiim$ /Users/kasiim/Documents/GitHub/SaveMe/futurerestore -t /Users/kasiim/Desktop/SaveMe/9024/12.4/9024_iPhone11\,2_d321ap_12.4-16G77_2f22848412a72bef5b6d439db8466ccdf38c54f3dfc6f01f67aa67d4947101ab.shsh2 /Users/kasiim/Downloads/iPhone11\,2_12.4_16G77_Restore.ipsw -b /Users/kasiim/Downloads/iPhone11\,2_12.4_16G77_Restore/Firmware/ICE18-1.06.02.Release.bbfw -p /Users/kasiim/Downloads/iPhone11\,2_12.4_16G77_Restore/BuildManifest.plist -s/Users/kasiim/Downloads/iPhone11\,2_12.4_16G77_Restore/Firmware/all_flash/sep-firmware.d321.RELEASE.im4p -m /Users/kasiim/Downloads/iPhone11\,2_12.4_16G77_Restore/BuildManifest.plist --update
Version: 81b98e0425e17250cc83d5badaf9a8cc6399f481 - 245
Libipatcher version: 3159a387584e352f690cca859e013c3a4683f3e8 - 69
Odysseus support: yes
ERROR: normal_idevice_new: can't open device with UDID c19a5690f2f235acb655a617d917bdee8208d011
[INFO] 64-bit device detected
futurerestore init done
reading signing ticket /Users/kasiim/Desktop/SaveMe/9024/12.4/9024_iPhone1
Kasims-MacBook-Pro:Downloads kasiim$ ./SaveMe-macOS
[*] Connect Device To Start..
[*] Press ENTER when Device is connected >
[*] Telling device with udid to enter recovery mode.
Device is successfully switching to recovery mode.
[*] Press ENTER when Device is in Recovery Mode >
[*] Detected Non A12(X) Device
[*] Device ApNonce does not match the unc0ver or chimera generator
[D] Device Model = iPad7,3
[D] Device UDID =
Kasims-MacBook-Pro:~ kasiim$ /Users/kasiim/Downloads/tsschecker.dms -d iPad7,3 -e --ios 13.1.2 --generator 0x1111111111111111 -s --save-path ~/Desktop
Version: 877592c6b2aa142ba8324791e67b498418a7e0b9 - 287
Libfragmentzip Version: ce600b161683281f48ee8c0bc5944b30c1fbc01a - 50
[TSSC] manually specified generator "0x1111111111111111"
[TSSC] manually specified ecid to use, parsed "" to dec: hex:
[TSSC] opening firmware.json
[JSON] counting elements
[JSON] parsing elements
[TSSC] got firmwareurl for iOS 13.1.2 build 17A860
[TSSC] opening Buildmanifest for iPad7,3_13.1.2_17A860
1) install brew
run this command in terminal -> /usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
2) install xcode tools
run this command in terminal -> xcode-select --install
3) install usbmuxd

Clone the project, e.g. myproject is my project repository:

git clone https://github/heiswayi/myproject.git

Since all of the commits history are in the .git folder, we have to remove it:

cd myproject

And delete the .git folder:

git rm -rf .git

Now, re-initialize the repository:

{
"Devices": {
"iPhone11,2": {
"Firmwares": [
{
"14.0": [
{
"IPSW": "https://updates.cdn-apple.com/2020SummerFCS/fullrestores/001-46850/8A4DA7D0-40E1-4079-A159-5B0983102B66/iPhone11,2,iPhone11,4,iPhone11,6,iPhone12,3,iPhone12,5_14.0_18A373_Restore.ipsw",
"SEP": "Firmware/all_flash/sep-firmware.d321.RELEASE.im4p",
"Baseband": "Firmware/ICE18-3.00.01.Release.bbfw"
- [05/04/21 15:20:57] <Info>: Waiting for DFU devices
- [05/04/21 15:21:20] <Verbose>: DFU mode device found
- [05/04/21 15:21:20] <Info>: Exploiting
- [05/04/21 15:21:20] <Verbose>: Attempting to perform checkm8 on 8011 10...
- [05/04/21 15:21:20] <Info>: Checking if device is ready
- [05/04/21 15:21:20] <Verbose>: == Checkm8 Preparation stage ==
- [05/04/21 15:21:20] <Verbose>: Stalled input endpoint
- [05/04/21 15:21:20] <Verbose>: DFU device disconnected
- [05/04/21 15:21:20] <Verbose>: DFU mode device found
- [05/04/21 15:21:20] <Info>: Setting up the exploit (this is the heap spray)
- [05/04/21 15:18:37] <Info>: Waiting for DFU devices
- [05/04/21 15:18:43] <Verbose>: DFU mode device found
- [05/04/21 15:18:43] <Info>: Exploiting
- [05/04/21 15:18:43] <Verbose>: Attempting to perform checkm8 on 8011 10...
- [05/04/21 15:18:43] <Info>: Checking if device is ready
- [05/04/21 15:18:43] <Verbose>: == Checkm8 Preparation stage ==
- [05/04/21 15:18:43] <Verbose>: Stalled input endpoint
- [05/04/21 15:18:44] <Verbose>: DFU device disconnected
- [05/04/21 15:18:44] <Verbose>: DFU mode device found
- [05/04/21 15:18:44] <Info>: Setting up the exploit (this is the heap spray)
- [05/04/21 15:24:55] <Info>: Waiting for DFU devices
- [05/04/21 15:24:55] <Verbose>: DFU mode device found
- [05/04/21 15:24:55] <Info>: Exploiting
- [05/04/21 15:24:55] <Verbose>: Attempting to perform checkm8 on 8011 10...
- [05/04/21 15:24:55] <Info>: Checking if device is ready
- [05/04/21 15:24:55] <Verbose>: == Checkm8 Preparation stage ==
- [05/04/21 15:24:55] <Verbose>: Stalled input endpoint
- [05/04/21 15:24:56] <Verbose>: DFU mode device found
- [05/04/21 15:24:56] <Info>: Setting up the exploit (this is the heap spray)
- [05/04/21 15:24:56] <Verbose>: == Checkm8 Setup stage ==