Hackt1vator / applera1n

icloud bypass for ios 15-16
https://applera1n.github.io
GNU General Public License v3.0
287 stars 59 forks source link

applera1n

icloud bypass for ios 15-16.6 tethered(macos and Linux)

![alt text](https://github.com/Laurin226/applera1n_bypass/blob/main/demoing.png)

This project is no longer updated. Please use hackt1vator Unlock instead: Hackt1vator Unlock

This is a modded version of Palera1n jailbreak

releasesTwitterWebsite

This is a no signal bypass

The gui was made with Python3MacApp LearnerTemplate from @ios_euphoria

On A11 and A10 devices don´t set a passcode after bypass

Here you can download the Palera1n loader ipa: Palera1n.ipa

!!!Warning! This is for educational purpose only!!!

Here you can donate the developer: buymeacoffee

How does it work: It boots the device with multiple patches required. On first run, it'll boot a ramdisk which dumps your onboard blob, creates a fakefs (if using semi tethered), installs the loader app, and patches your kernel.

# bypass on macos

install here the Dependencies of Silver, it should work for applera1n also: https://www.appletech752.com/dependencies.sh

Run bash (drag and drop here the file)

download applera1n and unzip it

Open a terminal window and cd to the directory that applera1n was downloaded to.

Run git init -b main

Run sudo xattr -rd com.apple.quarantine ./*

Run sudo xattr -d com.apple.quarantine ./*

Run sudo chmod 755 ./*

Now cd the palera1n and device/Darwin folder inside the applera1n folder and run the last 3 commands above again

cd the applera1n directory again

Last to launch the app, run this in terminal: python3 applera1n.py

Press: start bypass # bypass on Linux

download applera1n and unzip it

Connect your iphone

Open a terminal and run sudo systemctl stop usbmuxd then run sudo usbmuxd -f -p

Open a new terminal window and cd to the directory that applera1n was downloaded to.(do not close the old terminal)

Run bash install.sh

Run git init -b main

Run sudo chmod 755 ./*

Now cd the palera1n and device/Linux folder inside the applera1n folder and run sudo chmod 755 ./* again

cd the applera1n directory again

Last to launch the app, run this in terminal: python3 applera1n.py

Press: start bypass # Credits - [Daniel](https://github.com/DsSoft-Byte) : [pull request](https://github.com/Hackt1vator/applera1n/commit/6724fdf5c2261432a95276de1039317b1f774c05) Python3MacApp LearnerTemplate creator: ios_euphoria Original palera1n credits: - [Nathan](https://github.com/verygenericname) - The ramdisk that dumps blobs, installs pogo to tips app, and duplicates rootfs is a slimmed down version of [SSHRD_Script](https://github.com/verygenericname/SSHRD_Script) - For modified [restored_external](https://github.com/verygenericname/sshrd_SSHRD_Script) - Also helped Mineek getting the kernel up and running and with the patches - Helping with adding multiple device support - Fixing issues relating to camera.. etc by switching to fsboot - [iBoot64Patcher fork](https://github.com/verygenericname/iBoot64Patcher) - [Mineek](https://github.com/mineek) - For the patching and booting commands - Adding tweak support - For patchfinders for RELEASE kernels - [Kernel15Patcher](https://github.com/mineek/PongoOS/tree/iOS15/checkra1n/Kernel15Patcher) - [Kernel64Patcher](https://github.com/mineek/Kernel64Patcher) - [Amy](https://github.com/elihwyma) for the [Pogo](https://github.com/elihwyma/Pogo) app - [checkra1n](https://github.com/checkra1n) for the base of the kpf - [nyuszika7h](https://github.com/nyuszika7h) for the script to help get into DFU - [the Procursus Team](https://github.com/ProcursusTeam) for the amazing [bootstrap](https://github.com/ProcursusTeam/Procursus) - [F121](https://github.com/F121Live) for helping test - [m1sta](https://github.com/m1stadev) for [pyimg4](https://github.com/m1stadev/PyIMG4) - [tihmstar](https://github.com/tihmstar) for [pzb](https://github.com/tihmstar/partialZipBrowser)/original [iBoot64Patcher](https://github.com/tihmstar/iBoot64Patcher)/original [liboffsetfinder64](https://github.com/tihmstar/liboffsetfinder64)/[img4tool](https://github.com/tihmstar/img4tool) - [xerub](https://github.com/xerub) for [img4lib](https://github.com/xerub/img4lib) and [restored_external](https://github.com/xerub/sshrd) in the ramdisk - [Cryptic](https://github.com/Cryptiiiic) for [iBoot64Patcher](https://github.com/Cryptiiiic/iBoot64Patcher) fork, and [liboffsetfinder64](https://github.com/Cryptiiiic/liboffsetfinder64) fork - [libimobiledevice](https://github.com/libimobiledevice) for several tools used in this project (irecovery, ideviceenterrecovery etc), and [nikias](https://github.com/nikias) for keeping it up to date - [Nick Chan](https://github.com/asdfugil) general help with patches. - [Sam Bingner](https://github.com/sbingner) for [Substitute](https://github.com/sbingner/substitute) - [Serena](https://github.com/SerenaKit) for helping with boot ramdisk.