Skip to content
Razvan Deaconescu edited this page Dec 25, 2017 · 5 revisions

Welcome to the iExtractor wiki!

iExtractor is a collection of tools and scripts to automate data extraction from iOS firmware files (i.e. IPSW files).

iExtractor uses existing tools and layers of Bash shell scripts to automate the extraction and processing of data from IPSW (iPhone Software) firmware files. It runs on macOS and partially on Linux (certain tools and features only work on macOS).

iExtractor may be used by people interested in iOS internals to automate the processing of data for multiple iOS versions or simply to learn more about IPSW files, kernelcaches and sandbox profiles. By using a single command you will go through all steps from downloading the public Apple-provided IPSW file, to unpacking the kernel, to reversing the sandbox profiles. You can customize the scripts or build your own to process multiple IPSW files or to get a particular piece of information.

A tool similar to iExtractor is [ipsw_decrypt.py|https://github.com/kennytm/Miscellaneous/blob/master/ipsw_decrypt.py]. ipsw_decrypt.py is a Python script that decrypts all encrypted information inside an IPSW file. iExtractor also extracts kernel extensions, reverses sandbox profiles and extracts system dynamic libraries from the dyld shared cache.

Check the README file for information about installing and using iExtractor. Check the wiki pages below for more detailed information.

Input, Intermediary and Output Data

TODO

Tools of The Trade

TODO

Walkthrough

TODO

Scripts on Top of Tools

TODO

Debugging

TODO

Extending iExtractor

TODO

Clone this wiki locally