CLI tool to dump images in EAN storage from Apple devices.
# For macOS
make
# For (jailbroken) iOS
CC='xcrun -sdk iphoneos clang --target=arm64-apple-ios' make
Since this tool requires private entitlements, using it on macOS requires downgrading security. To do so, run:
Then boot into recovery and run:
This will break certain apps and certain OS functionality though, so once you're done messing with EAN, you can undo these changes with:
|
There are two modes:
eandump [key]
eandump all
key
is a four-character code that identifies the EAN image (e.g. ifw1
).
I don't know of any way to list existing images in EAN, but the kernel driver has a hardcoded whitelist, which is what the all
mode iterates through.
Files are dumped to the current working directory.
MIT.