ipa-medit v0.2.3 releases: memory search and patch tool for resigned ipa

ipa-medit

ipa-medit

Ipa-medit is a memory search and patch tool for resigned ipa without jailbreak. It was created for mobile game security testing.

Motivation

Memory modification is the easiest way to cheat in games, it is one of the items to be checked in the security test. There are also cheat tools that can be used casually like GameGem and iGameGuardian. However, there were no tools available for un-jailbroken devices and CUI. So I made it as a security testing tool. Android version is aktsk/apk-medit.

ipa-medit

Changelog v0.2.3

  • 228aa58 Merge pull request #10 from aktsk/fix/update-local-py

Installation

Requirements

$ brew install –HEAD libplist
$ brew install –HEAD usbmuxd
$ brew install –HEAD libimobiledevice
$ brew install –HEAD ideviceinstaller

Install

Binary

Download the binary from GitHub Releases and drop it in your $PATH.

Manually Build

You need a Go compiler.

$ go install github.com/aktsk/ipa-medit@latest

Use

To launch it, specify the executable file path contained in the .ipa file for -bin and the bundle id for -id.

$ unzip tap1000000.ipa
$ ipa-medit -bin=”./Payload/tap1000000.app/tap1000000″ -id=”jp.hoge.tap1000000″

The target .ipa file must be signed with a certificate installed on your computer. If you want to perform memory tampering on third-party applications, please use a tool such as ipautil to perform the resigning.

$ ipautil decode tap1000000.ipa # unzip
$ ipautil build Payload # resign and generate .ipa file

Tutorial

Copyright (C) 2021 Akatsuki Inc.