TikTok Bypass
TikTok Bypass (Follow/Like) Jailbreak/sideloadeduser_5677048032
objectivec
4 years ago
3.8 kB
428
Indexable
// Created by Ahmed Bafkir on 18/09/2021.
NSArray *jailbreakPaths = @[
///Applications
@"/Applications/Cydia.app", @"/Applications/blackra1n.app",
@"/Applications/FakeCarrier.app", @"/Applications/Icy.app",
@"/Applications/IntelliScreen.app", @"/Applications/MxTube.app",
@"/Applications/RockApp.app", @"/Applications/SBSettings.app", @"/Applications/WinterBoard.app",
//.
@"/.cydia_no_stash", @"/.installed_unc0ver", @"/.bootstrapped_electra",
//usr
@"/usr/libexec/cydia/firmware.sh", @"/usr/libexec/ssh-keysign", @"/usr/libexec/sftp-server",
@"/usr/bin/ssh", @"/usr/bin/sshd", @"/usr/sbin/sshd",
//var
@"/var/lib/cydia", @"/var/lib/dpkg/info/mobilesubstrate.md5sums",
@"/var/log/apt", @"/usr/share/jailbreak/injectme.plist", @"/usr/sbin/frida-server",
//Library
@"/Library/MobileSubstrate/CydiaSubstrate.dylib", @"/Library/TweakInject",
@"/Library/MobileSubstrate/MobileSubstrate.dylib", @"Library/MobileSubstrate/MobileSubstrate.dylib",
@"/Library/MobileSubstrate/DynamicLibraries/LiveClock.plist", @"/Library/MobileSubstrate/DynamicLibraries/Veency.plist",
//System
@"/System/Library/LaunchDaemons/com.ikey.bbot.plist", @"/System/Library/LaunchDaemons/com.saurik.Cydia.Startup.plist", @"/System/Library/CoreServices/SystemVersion.plist",
//private
@"/private/var/mobile/Library/SBSettings/Themes", @"/private/var/lib/cydia",
@"/private/var/tmp/cydia.log", @"/private/var/log/syslog",
@"/private/var/cache/apt/", @"/private/var/lib/apt",
@"/private/var/Users/", @"/private/var/stash",
//usr
@"/usr/lib/libjailbreak.dylib", @"/usr/lib/libz.dylib",
@"/usr/lib/system/introspectionNSZombieEnabled",
@"/usr/lib/dyld",
//jb
@"/jb/amfid_payload.dylib", @"/jb/libjailbreak.dylib",
@"/jb/jailbreakd.plist", @"/jb/offsets.plist",
@"/jb/lzma",
//hmd
@"/hmd_tmp_file",
//etc
@"/etc/ssh/sshd_config", @"/etc/apt/undecimus/undecimus.list",
@"/etc/apt/sources.list.d/sileo.sources", @"/etc/apt/sources.list.d/electra.list",
@"/etc/apt", @"/etc/ssl/certs", @"/etc/ssl/cert.pem",
//bin
@"/bin/sh", @"/bin/bash",
];
#pragma mark - Bypass Securtiy
%hook NSFileManager
-(BOOL)fileExistsAtPath:(id)arg1 {
for (NSString *file in jailbreakPaths) {
if ([arg1 isEqualToString:file]) {
return NO;
}
}
return %orig;
}
-(BOOL)fileExistsAtPath:(id)arg1 isDirectory:(BOOL*)arg2 {
for (NSString *file in jailbreakPaths) {
if ([arg1 isEqualToString:file]) {
return NO;
}
}
return %orig;
}
%end
%hook BDADeviceHelper
+(bool)isJailBroken {
return NO;
}
%end
%hook UIDevice
+(bool)btd_isJailBroken {
return NO;
}
%end
%hook TTInstallUtil
+(bool)isJailBroken {
return NO;
}
%end
%hook AppsFlyerUtils
+(bool)isJailbrokenWithSkipAdvancedJailbreakValidation:(bool)arg2 {
return NO;
}
%end
%hook PIPOIAPStoreManager
-(bool)_pipo_isJailBrokenDeviceWithProductID:(id)arg2 orderID:(id)arg3 {
return NO;
}
%end
%hook IESLiveDeviceInfo
+(bool)isJailBroken {
return NO;
}
%end
%hook PIPOStoreKitHelper
-(bool)isJailBroken {
return NO;
}
%end
%hook BDInstallNetworkUtility
+(bool)isJailBroken {
return NO;
}
%end
%hook TTAdSplashDeviceHelper
+(bool)isJailBroken {
return NO;
}
%end
//#################################
%hook GULAppEnvironmentUtil
+(bool)isFromAppStore {
return YES;
}
+(bool)isAppStoreReceiptSandbox {
return NO;
}
+(bool)isAppExtension {
return YES;
}
%end
%hook FBSDKAppEventsUtility
+(bool)isDebugBuild {
return NO;
}
%end
%hook AWEAPMManager
+(id)signInfo {
return @"AppStore";
}
%end
%hook NSBundle
-(id)pathForResource:(id)arg1 ofType:(id)arg2 {
if ([arg2 isEqualToString:@"mobileprovision"]) {
return nil;
}
return %orig;
}
%end
//real bypass
%hook AWESecurity
- (void)resetCollectMode {
return;
}
%end
%hook MSManagerOV
- (id)setMode {
return (id (^)(id)) ^{
};
}
%end
%hook MSConfigOV
- (id)setMode {
return (id (^)(id)) ^{
};
}
%end
Editor is loading...