A swiss army knife for your iPhone apps using CVE-2022-46689.
IPA available in the Releases section.
- iOS 15.0-15.4.1: Not officially supported.
- iOS 15.5-15.7.1: Supported.
- iOS 15.7.2+: Not supported.
- iOS 16.0-16.1.2: Supported.
- iOS 16.2-16.5: Not supported... yet.
- App Manager
- List all installed apps, including hidden system apps.
- Backup and restore app data (importing .abdk backups is also supported)
- View app details
- Delete app data/cache
- View and modify app documents
- Enable JIT*
- Export encrypted IPAs
- Sort Home Screen by app names or icon colors
- Miscellaneous Tools
- Whitelist (remove enterprise certificate blacklist)
- Remove three-app-limit
- Manually refresh icon cache
*JIT can only be enabled if AppCommander is signed using a (free) developer certificate and after following the setup process in Settings > Set up JIT
.
You can install through AltStore, Sideloadly, or Xcode.
TrollStore is not officially supported, and using enterprise signing apps such as Scarlet or ESign will not allow you to import backups.
You can create an issue on this repo, or join the Cowabunga Discord server where I or someone else can help you in the #appcommander channel.
AppCommander uses TelemetryDeck to collect anonymized analytics data. You can disable any data collection in the Settings tab, and view TelemetryKit's privacy policy.
Just build like a normal Xcode project. Sign using your own team and bundle identifier. You can also build the IPA file by running make
.
Credits can be viewed in the app by going to Settings > About AppCommander
.