├── README.md ├── bypass_scripts ├── A6_menu.sh ├── mobileactivationd_12_4_7 │ ├── mobileactivationd │ └── run.sh ├── mobileactivationd_13_x │ ├── mobileactivationd │ └── run.sh ├── ramdisk_ipad4 │ ├── ramdisk.tar.gz │ └── run.sh ├── ramdisk_iphone5 │ ├── ramdisk.tar.gz │ └── run.sh └── ramdisk_iphone5c │ ├── ramdisk.tar.gz │ └── run.sh └── hacktivation.sh /README.md: -------------------------------------------------------------------------------- 1 | # iOS Hacktivation Toolkit 2 | 3 | ### WORKING ON THE LATEST iOS FIRMWARE CURRENTLY AVAILABLE (iOS 13.5.1) 4 | 5 | This is an iOS Activation Lock Bypass Tool. I wrote this tool mainly because there is nothing out there for Linux (that i could find anyway). 6 | 7 | Looking for developers! This is a work in progress. If you think you can add to this project please get in touch! 8 | 9 | ### Screenshot 10 | 11 | ![img](https://i.imgur.com/Teuq7AO.png) 12 | 13 | ### Currently supported 14 | 15 | What things you need to install the software and how to install them 16 | 17 | ``` 18 | iPhone X 19 | iPhone 8 20 | iPhone 7 21 | iPhone SE 22 | iPhone 6s 23 | iPhone 6 24 | iPhone 5s 25 | iPhone 5c 26 | iPhone 5 27 | iPhone 2/3 28 | 29 | iPad Pro (2015 & 2017 models) 30 | iPad 4th/5th/6th/7th Generation 31 | iPad Mini 4 32 | iPad Air 2 33 | iPad Air 1 (WiFi) 34 | iPad Mini 3 35 | iPad Mini 2 (WiFi) 36 | 37 | iPod Touch 7th Generation 38 | iPod Touch 6th Generation 39 | iPod Touch 3rd Generation 40 | iPod Touch 2nd Generation 41 | iPod Touch 1st Generation 42 | ``` 43 | 44 | ### Features 45 | 46 | 47 | ``` 48 | Restore iDevice (Factory reset & firmware upgrade) 49 | Jailbreak (checkra1n) 50 | Activation Lock Bypass (Hello screen) for all checkra1n-able devices + iPhone 5, 5c, and iPad 4 51 | ``` 52 | ### Install 53 | 54 | UBUNTU LIVE USB USERS WILL NEED TO ENABLE SOFTWARE REPOS IN SOFTWARE & UPDATES 55 | 56 | ![img](https://i.imgur.com/05scg8J.png) 57 | 58 | 59 | ``` 60 | sudo apt install git 61 | git clone https://github.com/Hacktivation/iOS-Hacktivation-Toolkit.git 62 | cd iOS-Hacktivation-Toolkit/ 63 | chmod +x hacktivation.sh 64 | sudo ./hacktivation.sh 65 | ``` 66 | 67 | Tested on Debian 10 and Ubuntu 20.04 68 | 69 | Looking for developers! This is a work in progress. If you think you can add to this project please get in touch! 70 | 71 | -------------------------------------------------------------------------------- /bypass_scripts/A6_menu.sh: -------------------------------------------------------------------------------- 1 | #COLOURS 2 | RED="\033[1;31m" 3 | GREEN="\033[1;32m" 4 | YELLOW="\033[1;33m" 5 | CYAN="\033[0;36m" 6 | NC="\e[0m" 7 | 8 | #loading ramdisks and ssh n stuff 9 | 10 | a6_load_ramdisks(){ 11 | if [ $chexmix == 1 ]; then 12 | devicename="iphone5" 13 | elif [ $chexmix == 2 ]; then 14 | devicename="iphone5c" 15 | elif [ $chexmix == 3 ]; then 16 | devicename="ipad4" 17 | else 18 | echo "waht teh fck" 19 | sleep 1 20 | cd .. && bash hacktivation.sh 21 | fi 22 | #Loading the ramdisks 23 | ./ipwndfu -l ../bypass_scripts/ramdisk_$devicename/iBSS 24 | cd .. 25 | sleep 1 26 | irecovery -f bypass_scripts/ramdisk_$devicename/iBEC 27 | sleep 3 28 | echo "waiting..." 29 | sleep 3 30 | irecovery -f bypass_scripts/ramdisk_$devicename/devicetree 31 | irecovery -c devicetree 32 | irecovery -f bypass_scripts/ramdisk_$devicename/ramdisk 33 | irecovery -c ramdisk 34 | irecovery -f bypass_scripts/ramdisk_$devicename/kernelcache 35 | irecovery -c bootx 36 | echo "waiting..." 37 | sleep 8 38 | #This is the SSH part 39 | rm ~/.ssh/known_hosts >/dev/null 2>&1 40 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 41 | python iphonessh/python-client/tcprelay.py -t 22:2222 & 42 | sleep 1 43 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 mount_hfs /dev/disk0s1s1 /mnt1 44 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 rm -r /mnt1/Applications/Setup.app 45 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 reboot_bak 46 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 47 | echo "" 48 | read -p "Bypass done. Press enter to return to the main menu." dummy 49 | bash hacktivation.sh 50 | } 51 | 52 | #### THIS IS THE END OF THE RAMDISK TEXT 53 | 54 | #ipwndfu section lol ;) 55 | ipwndfu_goto(){ 56 | echo " This will run ipwndfu as many times as you want." 57 | echo " DON'T WORRY IF YOU GET A LANGID ERROR, THAT'S FINE." 58 | read -p " Press enter to continue... " dummy 59 | cd ../ipwndfu 60 | ./ipwndfu -p 61 | sleep 5 62 | clear 63 | read -p "Is the device in pwned DFU yet? [ Y / n ]: " checkcheck 64 | if [ $checkcheck = "Y" ]; then 65 | a6_load_ramdisks; 66 | elif [ $checkcheck = "y" ]; then 67 | a6_load_ramdisks; 68 | elif [ $checkcheck = "Yes" ]; then 69 | a6_load_ramdisks; 70 | elif [ $checkcheck = "yes" ]; then 71 | a6_load_ramdisks; 72 | elif [ $checkcheck = "YES" ]; then 73 | a6_load_ramdisks; 74 | else 75 | ipwndfu_goto; 76 | fi 77 | } 78 | 79 | a6_bypass_select(){ 80 | clear; 81 | echo -e "$GREEN" 82 | echo " **************************************************" 83 | echo " *************** Choose your device ***************" 84 | echo -e " **************************************************$NC" 85 | echo ' --------------------------------------------------' 86 | echo ' Before you bypass, make sure to restore your device' 87 | echo ' and IMMEDIATELY go into DFU mode.' 88 | echo ' --------------------------------------------------' 89 | echo -e "$CYAN 1 : iPhone 5$NC" 90 | echo -e "$CYAN 2 : iPhone 5c$NC" 91 | echo -e "$CYAN 3 : iPad 4$NC" 92 | echo -e "$CYAN 0 : Return to Main Menu" 93 | read -p " Choose > " chexmix 94 | if [ $chexmix == 1 ]; then 95 | clear 96 | ipwndfu_goto 97 | elif [ $chexmix == 2 ]; then 98 | clear 99 | ipwndfu_goto 100 | elif [ $chexmix == 3 ]; then 101 | clear 102 | ipwndfu_goto 103 | else 104 | cd .. && bash hacktivation.sh 105 | fi 106 | } 107 | a6_bypass_select 108 | -------------------------------------------------------------------------------- /bypass_scripts/mobileactivationd_12_4_7/mobileactivationd: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/mobileactivationd_12_4_7/mobileactivationd -------------------------------------------------------------------------------- /bypass_scripts/mobileactivationd_12_4_7/run.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | rm ~/.ssh/known_hosts >/dev/null 2>&1 4 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 5 | python iphonessh/python-client/tcprelay.py -t 44:2222 & 6 | sleep 2 7 | while true ; do 8 | result=$(ssh -p 2222 -o BatchMode=yes -o ConnectTimeout=1 root@localhost echo ok 2>&1 | grep Connection) # -n shows line number 9 | echo "DEBUG: WAITING FOR CONNECTION, PLEASE DISCONNECT AND RE-CONNECT USB CABLE" 10 | sleep 1 11 | if [ -z "$result" ] ; then 12 | echo 'CONNECTED TO DEVICE!' 13 | echo 'CONTINUE TO THE CHOOSE A WIFI NETWORK SCREEN BUT DO NOT CONNECT TO A NETWORK' 14 | read -p 'PRESS ENTER TO CONTINUE' 15 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 mount -o rw,union,update / 16 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 launchctl unload /System/Library/LaunchDaemons/com.apple.mobileactivationd.plist 17 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 rm /usr/libexec/mobileactivationd 18 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 uicache --all 19 | sshpass -p 'alpine' scp -P 2222 bypass_scripts/mobileactivationd_12_4_7/mobileactivationd root@localhost:/usr/libexec/mobileactivationd 20 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 chmod 755 /usr/libexec/mobileactivationd 21 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 launchctl load /System/Library/LaunchDaemons/com.apple.mobileactivationd.plist 22 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 23 | echo 'CHOOSE CONNECT TO ITUNES OPTION ON DEVICE TO COMPLETE BYPASS' 24 | break 25 | fi 26 | done 27 | 28 | read -p "RETURN TO MENU? [ Y / N ] : " check 29 | 30 | if [ $check = "Y" ]; then 31 | bash hacktivation.sh 32 | elif [ $check = "y" ]; then 33 | bash hacktivation.sh 34 | elif [ $check = "Yes" ]; then 35 | bash hacktivation.sh 36 | elif [ $check = "yes" ]; then 37 | bash hacktivation.sh 38 | elif [ $check = "YES" ]; then 39 | bash hacktivation.sh 40 | else 41 | exit 1 42 | fi 43 | -------------------------------------------------------------------------------- /bypass_scripts/mobileactivationd_13_x/mobileactivationd: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/mobileactivationd_13_x/mobileactivationd -------------------------------------------------------------------------------- /bypass_scripts/mobileactivationd_13_x/run.sh: -------------------------------------------------------------------------------- 1 | rm ~/.ssh/known_hosts >/dev/null 2>&1 2 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 3 | python iphonessh/python-client/tcprelay.py -t 44:2222 & 4 | sleep 1 5 | while true ; do 6 | result=$(ssh -p 2222 -o BatchMode=yes -o ConnectTimeout=1 root@localhost echo ok 2>&1 | grep Connection) # -n shows line number 7 | echo "DEBUG: WAITING FOR CONNECTION, PLEASE DISCONNECT AND RE-CONNECT USB CABLE" 8 | sleep 1 9 | if [ -z "$result" ] ; then 10 | echo 'CONNECTED TO DEVICE!' 11 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 mount -o rw,union,update / 12 | sshpass -p 'alpine' scp -P 2222 bypass_scripts/mobileactivationd_13_x/mobileactivationd root@localhost:/usr/libexec/mobileactivationd 13 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 chmod 755 /usr/libexec/mobileactivationd 14 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 launchctl unload /System/Library/LaunchDaemons/com.apple.mobileactivationd.plist 15 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 launchctl load /System/Library/LaunchDaemons/com.apple.mobileactivationd.plist 16 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 uicache -a 17 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 killall backboardd 18 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 killall SpringBoard 19 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 20 | break 21 | fi 22 | done 23 | 24 | read -p "RETURN TO MENU? [ Y / N ] : " check 25 | 26 | if [ $check = "Y" ]; then 27 | bash hacktivation.sh 28 | elif [ $check = "y" ]; then 29 | bash hacktivation.sh 30 | elif [ $check = "Yes" ]; then 31 | bash hacktivation.sh 32 | elif [ $check = "yes" ]; then 33 | bash hacktivation.sh 34 | elif [ $check = "YES" ]; then 35 | bash hacktivation.sh 36 | else 37 | exit 1 38 | fi 39 | -------------------------------------------------------------------------------- /bypass_scripts/ramdisk_ipad4/ramdisk.tar.gz: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/ramdisk_ipad4/ramdisk.tar.gz -------------------------------------------------------------------------------- /bypass_scripts/ramdisk_ipad4/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/ramdisk_ipad4/run.sh -------------------------------------------------------------------------------- /bypass_scripts/ramdisk_iphone5/ramdisk.tar.gz: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/ramdisk_iphone5/ramdisk.tar.gz -------------------------------------------------------------------------------- /bypass_scripts/ramdisk_iphone5/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/ramdisk_iphone5/run.sh -------------------------------------------------------------------------------- /bypass_scripts/ramdisk_iphone5c/ramdisk.tar.gz: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/ramdisk_iphone5c/ramdisk.tar.gz -------------------------------------------------------------------------------- /bypass_scripts/ramdisk_iphone5c/run.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlexEditions/iOS-Hacktivation-Toolkit/dc4ea1e91f673b14f9128a4e122784c4c960113c/bypass_scripts/ramdisk_iphone5c/run.sh -------------------------------------------------------------------------------- /hacktivation.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | #This program is free software: you can redistribute it and/or modify 4 | #it under the terms of the GNU General Public License as published by 5 | #the Free Software Foundation, either version 3 of the License, or 6 | #(at your option) any later version. 7 | 8 | #This program is distributed in the hope that it will be useful, 9 | #but WITHOUT ANY WARRANTY; without even the implied warranty of 10 | #MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 11 | #GNU General Public License for more details. 12 | 13 | #You should have received a copy of the GNU General Public License 14 | #along with this program. If not, see . 15 | 16 | 17 | #COLOURS 18 | RED="\033[1;31m" 19 | GREEN="\033[1;32m" 20 | YELLOW="\033[1;33m" 21 | CYAN="\033[0;36m" 22 | NC="\e[0m" 23 | 24 | 25 | ########################### 26 | #ROOT PRIVILEGES 27 | ########################### 28 | 29 | if [[ $EUID -ne 0 ]]; then 30 | echo -e "$RED You don't have root privileges, execute the script as root.$NC" 31 | exit 1 32 | fi 33 | 34 | clear 35 | 36 | ########################### 37 | #MENU 38 | ########################### 39 | 40 | main_menu(){ 41 | 42 | echo -e "$GREEN" 43 | 44 | echo " **************************************************" 45 | echo " ************ iOS Hacktivation Toolkit ************" 46 | echo -e " **************************************************$NC" 47 | echo -e " [+] $GREEN Coded by SRS $NC [+]" 48 | echo -e " [+] $GREEN appsec@tuta.io$NC [+]" 49 | echo -e " [+]$GREEN Co-developed by @johnponflanchan$NC [+]" 50 | echo -e " [+]$GREEN Thanks to$NC :$GREEN @exploit3dguy + @appletech752 $NC [+]" 51 | echo -e " [+]$GREEN & @iRogerosx $NC [+]" 52 | 53 | ActivationState=$(ideviceinfo | grep ActivationState | awk '{print $NF}') 54 | MobileEquipmentIdentifier=$(ideviceinfo | grep 'MobileEquipmentIdentifier' | sed "s/^[ \t]*//" | uniq | awk '{print $NF}') 55 | DeviceName=$(ideviceinfo | grep DeviceName | awk '{print $NF}') 56 | UniqueDeviceID=$(ideviceinfo | grep UniqueDeviceID | awk '{print $NF}') 57 | SerialNumber=$(ideviceinfo | grep -w SerialNumber | awk '{print $NF}') 58 | ProductType=$(ideviceinfo | grep ProductType | awk '{print $NF}') 59 | ProductVersion=$(ideviceinfo | grep ProductVersion | awk '{print $NF}') 60 | 61 | if test -z "$ActivationState" 62 | then 63 | echo ' --------------------------------------------------' 64 | echo -e "$RED CANNOT CONNECT TO DEVICE " 65 | echo -e "$RED IF YOUR DEVICE IS IN DFU MODE, THIS IS OKAY$NC" 66 | echo ' --------------------------------------------------' 67 | else 68 | echo ' --------------------------------------------------' 69 | echo -e "$GREEN Activation State : $ActivationState $NC" 70 | echo -e "$GREEN IMEI : $MobileEquipmentIdentifier $NC" 71 | echo -e "$GREEN Device Name : $DeviceName $NC" 72 | echo -e "$GREEN Serial Number : $SerialNumber $NC" 73 | echo -e "$GREEN Device : $ProductType $NC" 74 | echo -e "$GREEN Firmware : $ProductVersion $NC" 75 | echo ' --------------------------------------------------' 76 | fi 77 | 78 | echo -e "$YELLOW Select From Menu : $NC" 79 | echo ' --------------------------------------------------' 80 | echo -e "$CYAN 1 : Complete Installation$NC" 81 | echo -e "$CYAN 2 : Factory Reset (Restore iDevice)$NC" 82 | echo -e "$CYAN 3 : Jailbreak (checkra1n)$NC" 83 | echo -e "$CYAN 4 : Bypass iOS 13.0 > | 6S, SE, 7, 8, X$NC" 84 | echo -e "$CYAN 5 : Bypass iOS 12.4.7 | 5S, 6$NC" 85 | echo -e "$CYAN 6 : Bypass Ramdisk | 5, 5C, iPad 4$NC" 86 | echo -e "$CYAN 7 : SSH Shell$NC" 87 | echo -e "$CYAN 0 : Exit$NC" 88 | echo ' --------------------------------------------------' 89 | read -p " Choose > " ch 90 | 91 | ########################### 92 | #INSTALL 93 | ########################### 94 | 95 | if [ $ch = 1 ]; then 96 | 97 | echo "deb https://assets.checkra.in/debian /" | sudo tee -a /etc/apt/sources.list 98 | apt-key adv --fetch-keys https://assets.checkra.in/debian/archive.key 99 | apt update 100 | apt install -y python libcurl4-openssl-dev libplist-dev libzip-dev openssl libssl-dev libusb-1.0-0-dev libreadline-dev build-essential git make automake libtool pkg-config checkra1n sshpass 101 | git clone 'https://github.com/libimobiledevice/libirecovery' 102 | git clone 'https://github.com/libimobiledevice/idevicerestore' 103 | git clone 'https://github.com/libimobiledevice/usbmuxd' 104 | git clone 'https://github.com/libimobiledevice/libimobiledevice' 105 | git clone 'https://github.com/libimobiledevice/libusbmuxd' 106 | git clone 'https://github.com/libimobiledevice/libplist' 107 | git clone 'https://github.com/rcg4u/iphonessh.git' 108 | git clone 'https://github.com/DanielVolt/ipwndfu.git' 109 | cd ./libplist && ./autogen.sh --without-cython && sudo make install && cd .. 110 | cd ./libusbmuxd && ./autogen.sh && sudo make install && cd .. 111 | cd ./libimobiledevice && ./autogen.sh --without-cython && sudo make install && cd .. 112 | cd ./usbmuxd && ./autogen.sh && sudo make install && cd .. 113 | cd ./libirecovery && ./autogen.sh && sudo make install && cd .. 114 | cd ./idevicerestore && ./autogen.sh && sudo make install && cd .. 115 | tar xvf ./bypass_scripts/ramdisk_ipad4/ramdisk.tar.gz -C bypass_scripts/ramdisk_ipad4/ 116 | tar xvf ./bypass_scripts/ramdisk_iphone5/ramdisk.tar.gz -C bypass_scripts/ramdisk_iphone5/ 117 | tar xvf ./bypass_scripts/ramdisk_iphone5c/ramdisk.tar.gz -C bypass_scripts/ramdisk_iphone5c/ 118 | sudo ldconfig 119 | echo "" 120 | read -p "Complete! Back To Menu? [ Y / n ] : " check 121 | 122 | if [ $check = "Y" ]; then 123 | bash hacktivation.sh 124 | elif [ $check = "y" ]; then 125 | bash hacktivation.sh 126 | elif [ $check = "Yes" ]; then 127 | bash hacktivation.sh 128 | elif [ $check = "yes" ]; then 129 | bash hacktivation.sh 130 | elif [ $check = "YES" ]; then 131 | bash hacktivation.sh 132 | else 133 | exit 1 134 | fi 135 | 136 | ########################### 137 | #RESTORE 138 | ########################### 139 | 140 | elif [ $ch = 2 ]; then 141 | 142 | idevicerestore -e -l 143 | echo "" 144 | read -p "Complete! Back To Menu? [ Y / n ] : " check2 145 | 146 | if [ $check2 = "Y" ]; then 147 | bash hacktivation.sh 148 | elif [ $check2 = "y" ]; then 149 | bash hacktivation.sh 150 | elif [ $check2 = "Yes" ]; then 151 | bash hacktivation.sh 152 | elif [ $check2 = "yes" ]; then 153 | bash hacktivation.sh 154 | elif [ $check2 = "YES" ]; then 155 | bash hacktivation.sh 156 | else 157 | exit 1 158 | fi 159 | 160 | ########################### 161 | #CHECKRA1N 162 | ########################### 163 | 164 | elif [ $ch = 3 ]; then 165 | 166 | checkra1n 167 | echo "" 168 | read -p "Complete! Back To Menu? [ Y / n ] : " check3 169 | 170 | if [ $check3 = "Y" ]; then 171 | bash hacktivation.sh 172 | elif [ $check3 = "y" ]; then 173 | bash hacktivation.sh 174 | elif [ $check3 = "Yes" ]; then 175 | bash hacktivation.sh 176 | elif [ $check3 = "yes" ]; then 177 | bash hacktivation.sh 178 | elif [ $check3 = "YES" ]; then 179 | bash hacktivation.sh 180 | else 181 | exit 1 182 | fi 183 | 184 | ########################### 185 | #IOS 13 > MOBILEACTIVATIOND 186 | ########################### 187 | 188 | elif [ $ch = 4 ]; then 189 | 190 | bypass_scripts/mobileactivationd_13_x/./run.sh 191 | 192 | echo"" 193 | read -p "Complete! Back To Menu? [ Y / n ] : " check4 194 | 195 | 196 | if [ $check4 = "Y" ]; then 197 | bash hacktivation.sh 198 | elif [ $check4 = "y" ]; then 199 | bash hacktivation.sh 200 | elif [ $check4 = "Yes" ]; then 201 | bash hacktivation.sh 202 | elif [ $check4 = "yes" ]; then 203 | bash hacktivation.sh 204 | elif [ $check4 = "YES" ]; then 205 | bash hacktivation.sh 206 | else 207 | exit 1 208 | fi 209 | 210 | elif [ $ch = 5 ]; then 211 | 212 | bypass_scripts/mobileactivationd_12_4_7/./run.sh 213 | 214 | ########################### 215 | #A6 bypass lol 216 | ########################### 217 | 218 | elif [ $ch = 6 ]; then 219 | 220 | cd bypass_scripts && chmod +x ./A6_menu.sh && bash A6_menu.sh 221 | 222 | ########################### 223 | #SSH SHELL 224 | ########################### 225 | elif [ $ch = 7 ]; then 226 | 227 | echo "" 228 | rm ~/.ssh/known_hosts >/dev/null 2>&1 229 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 230 | python iphonessh/python-client/tcprelay.py -t 44:2222 >/dev/null 2>&1 & 231 | sleep 2 232 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 mount -o rw,union,update / 233 | sshpass -p 'alpine' ssh -o StrictHostKeyChecking=no root@localhost -p 2222 234 | pgrep -f 'tcprelay.py' | xargs kill >/dev/null 2>&1 235 | echo "" 236 | read -p "Complete! Back To Menu? [ Y / n ] : " check6 237 | 238 | if [ $check7 = "Y" ]; then 239 | bash hacktivation.sh 240 | elif [ $check7 = "y" ]; then 241 | bash hacktivation.sh 242 | elif [ $check7 = "Yes" ]; then 243 | bash hacktivation.sh 244 | elif [ $check7 = "yes" ]; then 245 | bash hacktivation.sh 246 | elif [ $check7 = "YES" ]; then 247 | bash hacktivation.sh 248 | else 249 | exit 1 250 | fi 251 | elif [ $ch == 0 ]; then 252 | echo -e "$RED Program Exit ...$NC" 253 | sleep 0.25 254 | exit 1 255 | else 256 | echo "Option not found. Try again." 257 | sleep 0.5 258 | clear 259 | main_menu 260 | fi 261 | 262 | } 263 | 264 | if [ -f "hacktivation.sh" ]; then 265 | main_menu; 266 | else 267 | echo " You need to run the script in the same folder the shell script is in." 268 | echo " You can't just drag it into the Terminal. Exiting..." 269 | exit 1 270 | fi 271 | --------------------------------------------------------------------------------