pymobiledevice3
MGSpoof
pymobiledevice3 | MGSpoof | |
---|---|---|
4 | 4 | |
1,027 | 76 | |
- | - | |
9.7 | 10.0 | |
2 days ago | over 3 years ago | |
Python | Objective-C | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pymobiledevice3
- FLaNK Stack Weekly for 27 November 2023
-
[$25][12.5.5] Modify MGSpoof to spoof the UDID reported by Lockdownd
However, when checking with some basic Python on the computer (specifically using https://github.com/doronz88/pymobiledevice3 to communicate with lockdownd) it still reported the device's actual UDID. The tweak hooks _MGCopyAnswer and lockdownd appears to get the UDID using that exact method. This is seen by popping the lockdownd binary in Ghidra disassembler: https://imgur.com/a/Hz6R5zT
- Sniffing syscalls on macOS and iOS made easy
- [TOOL] pymobiledevice3 is a better libimobiledevice purely in python
MGSpoof
- [Request] Update MGSpoof for arm64e
- [Question] Spoofing IOS version for apps
-
[50$] [13,12][OPT]MgSpoof tool
I need to have a tool for spoofing device information by command line tool. Your suggestions about bounty?Repo
-
[$25][12.5.5] Modify MGSpoof to spoof the UDID reported by Lockdownd
Here's a good starting point: https://github.com/ryannair05/MGSpoof/tree/patch-1 This is a modified fork of MGSpoof, a tweak used to modify the UDID within apps. Using this fork and specific branch is probably important for my iOS version as the master branch on the original repo would not work on my device for some reason, but this fork and specific branch does. I also made the changes from this commit and this commit that are on the main repo. These fix some build errors and add proper entitlements to work with checkra1ned devices. After building the tweak with those changes, it worked on my device, verified using the UDID shown in Cydia. Unfortunately, that's as far as I got.
What are some alternatives?
KivyMD - KivyMD is a collection of Material Design compliant widgets for use with Kivy, a framework for cross-platform, touch-enabled graphical applications. https://youtube.com/c/KivyMD https://twitter.com/KivyMD https://habr.com/ru/users/kivymd https://stackoverflow.com/tags/kivymd
MGSpoof - Hook MGCopyAnswer + custom helper so user can spoof some keys
afc-gui - GUI for the asus-fan-control project
kivy - Open source UI framework written in Python, running on Windows, Linux, macOS, Android and iOS
llama-recipes - Scripts for fine-tuning Meta Llama3 with composable FSDP & PEFT methods to cover single/multi-node GPUs. Supports default & custom datasets for applications such as summarization and Q&A. Supporting a number of candid inference solutions such as HF TGI, VLLM for local or cloud deployment. Demo apps to showcase Meta Llama3 for WhatsApp & Messenger.
LLaVA - [NeurIPS'23 Oral] Visual Instruction Tuning (LLaVA) built towards GPT-4V level capabilities and beyond.
llama_index - LlamaIndex is a data framework for your LLM applications
FLiPStackWeekly - FLaNK AI Weekly covering Apache NiFi, Apache Flink, Apache Kafka, Apache Spark, Apache Iceberg, Apache Ozone, Apache Pulsar, and more...
surge - Synthesizer plug-in (previously released as Vember Audio Surge)
vlite - fast vector database made in numpy
ollama - Get up and running with Llama 3, Mistral, Gemma, and other large language models.