Jump to content

castix

Senior Member
  • Posts

    2,379
  • Joined

  • Last visited

Everything posted by castix

  1. I don't know the guy who made it. Besides its not hard at all to recreate it
  2. Download the OpenSSH .deb Open a file browser like iFunbox, iTools etc. Navigate to /var/root/Media/Cydia/Autoinstall Copy the .deb in there Reboot your iDevice and OpenSSH should be installed You can now use semi-restore or whatever
  3. @@DiDA %hook FraggerAppDelegate - (BOOL)application:(id)fp8 didFinishLaunchingWithOptions:(id)fp12 { UIAlertView *alert = [[UIAlertView alloc] initWithTitle:@"Credits" message:@"Example by castix" delegate:self cancelButtonTitle:@"OK" otherButtonTitles:@"Website",nil]; [alert show]; } - (void)alertView:(UIAlertView *)alertView clickedButtonAtIndex:(NSInteger)buttonIndex { NSString *title = [alertView buttonTitleAtIndex:buttonIndex]; if([title isEqualToString:@"Website"]) { [[UIApplication sharedApplication] openURL:[NSURL URLWithString: @"http://Google.com"]]; } } %end
  4. This helper class can take any UIView and return to you a UIImage that is basically a screenshot of that view. Throw this into a category and you’re good to go. + (UIImage*)viewAsImage:(UIView*)view { UIImage *image = nil; UIGraphicsBeginImageContextWithOptions(view.bounds.size, NO, [UIScreen mainScreen].scale); [view.layer renderInContext:UIGraphicsGetCurrentContext()]; image = UIGraphicsGetImageFromCurrentImageContext(); UIGraphicsEndImageContext(); return image; }
  5. %hook FraggerAppDelegate - (BOOL)application:(id)fp8 didFinishLaunchingWithOptions:(id)fp12 { UIAlertView *alert = [[UIAlertView alloc] initWithTitle:@"Credits" message:@"Example by castix" delegate:self cancelButtonTitle:@"OK" otherButtonTitles:@"Website",nil]; [alert show]; } %new - (void)alertView:(UIAlertView *)alertView clickedButtonAtIndex:(NSInteger)buttonIndex { NSString *title = [alertView buttonTitleAtIndex:buttonIndex]; if([title isEqualToString:@"Website"]) { [[UIApplication sharedApplication] openURL:[NSURL URLWithString: @"http://iosgods.com"]]; } } %end
  6. I edited DiDA's first entry use it
  7. Doesn't work DiDA. At the start you declared it with credits and in the implementation with button. This will cause the following: If button = do alert ; but you can only click credits so it won't do anything
  8. Long live Limerain ! No more iAPCrazy or LocaliAPStore !
  9. Uninstall xCon and Flex Check
  10. Can you make a list of all installed Cydia Tweaks (not the system packages)
  11. Uh that means you shouldn't do the alert on this app Mail, Safari and other apps use the same class which means it will also be applied on them which leads to a crash. Only hack the alert if the function class is unique (in 70% of the cases it is)
  12. One '_' too much in your Makefile test_FRAMEWORKS = UIKitAlso #include <UIKit/UIKit.h>
  13. The class is likely marked with '...Delegate' You can also search functions like - (void)applicationsDidBecomeActive:(id)
  14. You can write it in your implementation file. When it's not a patcher add it with %new - (void)alertView:(UIAlertView *)alertView clickedButtonAtIndex:(NSInteger)buttonIndex { NSString *alert = [alertView buttonTitleAtIndex:buttonIndex]; if([alert isEqualToString:@"Website"]) { [[UIApplication sharedApplication] openURL:[NSURL URLWithString: @"http://iOSGods.com"]]; } } The class is MagicTimeIPhoneAppDelegate
  15. I could give you the best example if you would tell me the app name.
  16. You often skip lots of valuable functions using Flex/2. I'll recommend you to use Class-Dump for further hacking using basic MS. 1. Download Class-Dump from cydia store 2. I showed you how to crack an app using Clutch but I will do it again 2.1 Open Terminal and type su alpine Clutch // The first time to see the binary names Clutch "BinaryName"2.2 Go to /var/mobile/Documents/Cracked2.3 Click the info button of the .IPA you just cracked 2.4 Change the extension to .zip (It's .ipa.zip now) 2.5 Open the zip file and extract the binary 2.6 Go to /var/mobile/Documents/Payload and copyt the binary to /var/mobile (You can rename it to whatever you want) 3. Create a folder at /var/mobile/ called class-dump or something 4.Open Terminal again and type su alpine class-dump -H /var/mobile/BinaryName -o /var/mobile/class-dump. // Only if you named the folder class-dump]5. Now in this folder all the header files will appear. Feel free to go through all of them and find the best functions available !
  17. You are hacking OMG: TD! Open the .plist in iFile and it shows you the error.
  18. This discussion is awkward. You can't encode sub headers as the real functions are not existing. Read tutorials how to hack branches it's really an ease. @@Javi Tech @ you differ from the topic. Your way to get the HEX doesn't make any sense
  19. SUB R0, R0, #1
  20. Or they ask me for protection
  21. Preparing Swift tutorials, yay!

  22. Hm
  23. Do what I said ..
  24. A wonderful piece taken from my poem collection https://ghostbin.com/paste/xywg2/raw The number of words exceed the maximum post count number. I am sorry about that.
  25. UDID means 'Unique Device Identifier' and is used by iTunes to verify your iDevice to firmware versions. Some tweaks also took advantage of that. To answer your question: No there is no such tweak or app iFile still knows the old file directories of iOS 7 so creating a linked register to /var/mobile/Applications/ would fix that
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines