Recover lost iOS Restrictions/ScreenTime PINs from backups in seconds.
Suppors iOS 4 - 11 using Brute-Force attack.
When i was younger I had ScreenTime setup on my iPhone and sometimes it was very annoying. Years later after gaining some exprerience in computers and programming I decided to find a way how to extract the PIN from a phone. I was inspired by this blog post which undercovers how iOS was saving Salt + Target Key (the ingredients to the PIN) in the iPhone backup files and PinFinder program.
If you want to know more about how this script works, scroll down to: How It Works
Important
Windows users - You can skip these steps below and download executable from Releases tab
- Download and install Python 3
- Download this program from GitHub
- Locate the downloaded folder in CMD/Terminal
- Install requirements:
- MacOS:
pip3 install -r requirements.txt - Windows:
pip install -r requirements.txt
- MacOS:
- Run the program
- MacOS:
python3 main.py - Windows:
python main.py
- MacOS:
- Install requirements:
- Easy to use - run the program, select the backup, wait a few seconds, done!
- Auto-detect backups - automatically detects and lists all backups from deafult system paths
- Quick backups overview - iOS version, device name, device type, backup date, backup location
- Windows/MacOS supported - Multi-platform support
- Add Custom Backup Location option
Note
coming soon...
Found a bug or issue? Open a new issue in the Issues tab or create a fork of this repo.
PinFinder - inspiring me to create this program in first place
This blog post for detailed explanation how this method works and how to recreate PIN extraction.
turdus merula tool I was able downgrade my iPhone 7 (A10) to previous unsigned iOS versions to develop my program.
Made with π by asisamko
