DISCLAIMER: This tool is only meant for security research purposes, not for application crackers.
[+] detected 64bit ARM binary in memory. [+] offset to cryptid found: @0x10003cb68(from 0x10003c000) = b68 [+] Found encrypted data at address 00004000 of length 180224 bytes - type 1. [+] Opening /private/var/mobile/Containers/Bundle/Application/79909146-D31F-4225-B18E-8D08D5599FFA/XXX.app/XXX for reading. [+] Reading header [+] Detecting header type [+] Executable is a FAT image - searching for right architecture [+] Correct arch is at offset 245760 in the file [+] Opening SimpleNote.decrypted for writing. [+] Copying the not encrypted start of the file [+] Dumping the decrypted data into the file [+] Copying the not encrypted remainder of the file [+] Setting the LC_ENCRYPTION_INFO->cryptid to 0 at offset 3cb68 [+] Closing original file [+] Closing dump file v2panda-iPhone-5s:~ root#