https://github.com/someaspy/flightrecorder
Bash script to rip IPA files
https://github.com/someaspy/flightrecorder
bash frida ipa jailbreak script
Last synced: 4 days ago
JSON representation
Bash script to rip IPA files
- Host: GitHub
- URL: https://github.com/someaspy/flightrecorder
- Owner: SomeAspy
- Created: 2024-10-23T23:00:47.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-10-26T16:17:57.000Z (over 1 year ago)
- Last Synced: 2025-09-26T07:41:33.548Z (4 months ago)
- Topics: bash, frida, ipa, jailbreak, script
- Language: Shell
- Homepage:
- Size: 19.5 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: .github/readme.md
- Funding: .github/funding.yml
Awesome Lists containing this project
README
# FlightRecorder

Dump IPAs off a jailbroken iOS device automatically.
## Setup
### On idevice
1. Jailbreak the device
2. Using your favorite package manager, add and install Frida using the Frida repo ([Install docs](https://frida.re/docs/ios/))
3. on the device, install the following:
- `open`
- `plutil`
- An SSH server
4. Run `frida-server` (By default this will listen on `0.0.0.0:27042` - use `-l ip:port` to override)
> [!IMPORTANT]
> The idevice must be **awake**, otherwise the app cannot open.
## On server
1. Clone this repo
2. Copy `.env.example` to `.env`
3. Fill out `.env`
- `ideviceSSH`: SSH string to connect to the idevice in `user@host` format (You can also use presets from your SSH config)
- `ideviceIP`: IP of the idevice to SSH into and use Frida from
- `ideviceUser`: User for SSH (This is generally `mobile`)
- `idevicePort`: SSH port for the idevice (This is generally `2222` or `22`)
- `FridaPort`: The port for the Frida server (`frida-server` runs on `27042` by default)
- `IPAServer`: The web directory where you host IPAs (Should return `200` if the IPA exists, `404` otherwise)
- `UploadDirectory`: The directory the IPAs are hosted from for `IPAServer`
- `AppName`: The app's name (The first letter is usually capitalized)
- `AppIdentifier`: The app's identifier (This usually looks like `TLD.company.app`)
- `DiscordWebhook` [Optional]: The URL for the webhook
4. Run `setup.sh` (You may need to `chmod +x` the file)
- This script does the following:
1. Clones required submodules into the repository
2. Adds execution permission to `GetIPA.sh`
3. Initializes a Python virtual environment
4. Installs required Python dependencies
5. Run `GetIPA.sh`
- This script does the following:
1. Grabs variables from the `.env` file
2. SSHs into the idevice to get the app version information
3. Checks whether the IPA exists already on the server
- If it does, exit.
4. SSHs into the idevice and uses `open` to open the specified app
5. Runs [`frida-ios-dump`](https://github.com/miticollo/frida-ios-dump)'s [`decrypter.py`](https://github.com/miticollo/frida-ios-dump/blob/master/decrypter.py)
- This places the IPA file into the current folder
6. Rename the IPA file to `{name}_{semver}_{build}.ipa` and move to the server directory