├── mobileactivationd ├── libimobiledevice.1.2.1-r1122-win-x64.zip └── README.md /mobileactivationd: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wrcsubers/iOS_ActivationBypass/HEAD/mobileactivationd -------------------------------------------------------------------------------- /libimobiledevice.1.2.1-r1122-win-x64.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wrcsubers/iOS_ActivationBypass/HEAD/libimobiledevice.1.2.1-r1122-win-x64.zip -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ## iOS Activation Bypass Instructions for A7 Devices ## 2 | ### Confirmed Working Devices ### 3 | - iOS 12.5.6 4 | - iPad Air Gen 1 (As of 10/27/2022) 5 | - iOS 12.5.7 6 | - iPad Mini 3 (As of 01/13/2025 - Thanks to [adamk324]( "adamk324")) 7 | - iPad Mini 2 (As of 02/26/2025 - Thanks to [ManiProjs]( "ManiProjs")) 8 | - iPad Air (As of 04/07/2025) - Thanks to [VSjnk]( "VSjnk")) 9 | - iPhone 5s (As of 04/13/2025) - Thanks to [daodov]( "daodov")) 10 | - iPhone 6 (As of 09/08/2025) - Thanks to [lamduck2005]( "lamduck2005")) 11 | - iPhone 6 Plus (A1522) (As of 07/29/2025) - Thanks to [R3p1ns]( "R3p1ns")) 12 | - iPad Air Gen 1 (A1475) (As of 09/27/2025) - Thanks to [elvisef]( "elvisef")) 13 | 14 | ### Jailbreak the iDevice ### 15 | - Jailbreak with Checkra1n 0.10.2 16 | - https://checkra.in/releases/0.10.2-beta#all-downloads 17 | - Alternatively use Bootra1n 10.2 18 | - https://github.com/foxlet/bootra1n 19 | - This can be a VERY finicky process with freezing at the 'Right Before Trigger (this is the real bug setup)'. 20 | - Unplug the iDevice after ~15-20 seconds of the screen showing 'Right Before Trigger...' then plug the iDevice back in after 1-2 seconds. You should see a 'Booting Up' message immediately after plugging the device back in. If you don't you'll likely have to start all over with checkra!n. If you keep failing you can try and restore the iOS firmware in iTunes and start over again. 21 | 22 | ### Bypass iCloud Activation ### 23 | - Boot to Windows 24 | 25 | - Download libimobiledevice 26 | - https://github.com/libimobiledevice-win32/imobiledevice-net/releases/download/v1.3.17/libimobiledevice.1.2.1-r1122-win-x64.zip 27 | 28 | - Extract zip and open a Powershell window in the extracted directory 29 | - Start iProxy 30 | ``` 31 | .\iproxy.exe 22 44 32 | ``` 33 | - 22 is the local masquerade port 34 | - 44 is the port SSH is running on on the iDevice (SSH on the iDevice is 44 per Checkra1n docs) 35 | 36 | - Open a second powershell window 37 | - Type: **ssh root@127.0.0.1** 38 | - Password: **alpine** 39 | 40 | - Open WinSCP 41 | - Connect via SCP to 127.0.0.1 42 | - User: root 43 | - Password: alpine 44 | 45 | - On the iDevice, continue to the 'Chose a Wi-Fi Netowrk' screen but **DO NOT** connect 46 | 47 | - In the SSH Powershell console enter the following commands in order: 48 | ``` 49 | mount -o rw,union,update / 50 | launchctl unload /System/Library/LaunchDaemons/com.apple.mobileactivationd.plist 51 | rm /usr/libexec/mobileactivationd 52 | uicache --all 53 | ``` 54 | - In WinSCP Transfer the mobileactivationd file to the directory **/usr/libexec/** 55 | - Full path should be: **/usr/libexec/mobileactivationd** 56 | 57 | - Once complete enter the following commands in order: 58 | ``` 59 | chmod 755 /usr/libexec/mobileactivationd 60 | launchctl load /System/Library/LaunchDaemons/com.apple.mobileactivationd.plist 61 | ``` 62 | 63 | - Finally chose 'Connect to iTunes' on the bottom of the 'Chose a Wi-Fi Network' page to complete bypass 64 | 65 | 66 | 67 | These directions were pulled from many sources and compiled by me, the steps and patched mobileactivationd file for the iCloud bypass were extracted from [iOS-Hacktivation](https://github.com/Hacktivation/iOS-Hacktivation-Toolkit/tree/master/bypass_scripts/mobileactivationd_12_4_7). Many thanks to the talented individuals that create these tools! 68 | --------------------------------------------------------------------------------