TikTok Bypass
TikTok Bypass (Follow/Like) Jailbreak/sideloadeduser_5677048032
objectivec
3 years ago
3.8 kB
371
Indexable
// Created by Ahmed Bafkir on 18/09/2021. NSArray *jailbreakPaths = @[ ///Applications @"/Applications/Cydia.app", @"/Applications/blackra1n.app", @"/Applications/FakeCarrier.app", @"/Applications/Icy.app", @"/Applications/IntelliScreen.app", @"/Applications/MxTube.app", @"/Applications/RockApp.app", @"/Applications/SBSettings.app", @"/Applications/WinterBoard.app", //. @"/.cydia_no_stash", @"/.installed_unc0ver", @"/.bootstrapped_electra", //usr @"/usr/libexec/cydia/firmware.sh", @"/usr/libexec/ssh-keysign", @"/usr/libexec/sftp-server", @"/usr/bin/ssh", @"/usr/bin/sshd", @"/usr/sbin/sshd", //var @"/var/lib/cydia", @"/var/lib/dpkg/info/mobilesubstrate.md5sums", @"/var/log/apt", @"/usr/share/jailbreak/injectme.plist", @"/usr/sbin/frida-server", //Library @"/Library/MobileSubstrate/CydiaSubstrate.dylib", @"/Library/TweakInject", @"/Library/MobileSubstrate/MobileSubstrate.dylib", @"Library/MobileSubstrate/MobileSubstrate.dylib", @"/Library/MobileSubstrate/DynamicLibraries/LiveClock.plist", @"/Library/MobileSubstrate/DynamicLibraries/Veency.plist", //System @"/System/Library/LaunchDaemons/com.ikey.bbot.plist", @"/System/Library/LaunchDaemons/com.saurik.Cydia.Startup.plist", @"/System/Library/CoreServices/SystemVersion.plist", //private @"/private/var/mobile/Library/SBSettings/Themes", @"/private/var/lib/cydia", @"/private/var/tmp/cydia.log", @"/private/var/log/syslog", @"/private/var/cache/apt/", @"/private/var/lib/apt", @"/private/var/Users/", @"/private/var/stash", //usr @"/usr/lib/libjailbreak.dylib", @"/usr/lib/libz.dylib", @"/usr/lib/system/introspectionNSZombieEnabled", @"/usr/lib/dyld", //jb @"/jb/amfid_payload.dylib", @"/jb/libjailbreak.dylib", @"/jb/jailbreakd.plist", @"/jb/offsets.plist", @"/jb/lzma", //hmd @"/hmd_tmp_file", //etc @"/etc/ssh/sshd_config", @"/etc/apt/undecimus/undecimus.list", @"/etc/apt/sources.list.d/sileo.sources", @"/etc/apt/sources.list.d/electra.list", @"/etc/apt", @"/etc/ssl/certs", @"/etc/ssl/cert.pem", //bin @"/bin/sh", @"/bin/bash", ]; #pragma mark - Bypass Securtiy %hook NSFileManager -(BOOL)fileExistsAtPath:(id)arg1 { for (NSString *file in jailbreakPaths) { if ([arg1 isEqualToString:file]) { return NO; } } return %orig; } -(BOOL)fileExistsAtPath:(id)arg1 isDirectory:(BOOL*)arg2 { for (NSString *file in jailbreakPaths) { if ([arg1 isEqualToString:file]) { return NO; } } return %orig; } %end %hook BDADeviceHelper +(bool)isJailBroken { return NO; } %end %hook UIDevice +(bool)btd_isJailBroken { return NO; } %end %hook TTInstallUtil +(bool)isJailBroken { return NO; } %end %hook AppsFlyerUtils +(bool)isJailbrokenWithSkipAdvancedJailbreakValidation:(bool)arg2 { return NO; } %end %hook PIPOIAPStoreManager -(bool)_pipo_isJailBrokenDeviceWithProductID:(id)arg2 orderID:(id)arg3 { return NO; } %end %hook IESLiveDeviceInfo +(bool)isJailBroken { return NO; } %end %hook PIPOStoreKitHelper -(bool)isJailBroken { return NO; } %end %hook BDInstallNetworkUtility +(bool)isJailBroken { return NO; } %end %hook TTAdSplashDeviceHelper +(bool)isJailBroken { return NO; } %end //################################# %hook GULAppEnvironmentUtil +(bool)isFromAppStore { return YES; } +(bool)isAppStoreReceiptSandbox { return NO; } +(bool)isAppExtension { return YES; } %end %hook FBSDKAppEventsUtility +(bool)isDebugBuild { return NO; } %end %hook AWEAPMManager +(id)signInfo { return @"AppStore"; } %end %hook NSBundle -(id)pathForResource:(id)arg1 ofType:(id)arg2 { if ([arg2 isEqualToString:@"mobileprovision"]) { return nil; } return %orig; } %end //real bypass %hook AWESecurity - (void)resetCollectMode { return; } %end %hook MSManagerOV - (id)setMode { return (id (^)(id)) ^{ }; } %end %hook MSConfigOV - (id)setMode { return (id (^)(id)) ^{ }; } %end
Editor is loading...