You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

599 B

DEPRECATED: use the python version instead


Decrypts files data forks in raw iOS 4 disk images.
Reads encryption keys from plist file named after the volume ID.
The plist file must have at least the EMF and DKey fields set.
For now the tool decrypts the data forks but does not mark the files as
"decrypted" : running it twice on the same image will produce garbage.
Interrupting the process will also leave the image "half decrypted".

Uses planetbeing/dev team HFS implementation
https://github.com/planetbeing/xpwn

Only builds on Mac OS X, requires CoreFoundation for plist access.