![]() ![]() Redesigned the extraction method for Spreadtrum-based Android devices. Added selective chat extraction from Discord via Android Agent. Added the interface improvements to the selective extraction of iOS devices using the checkm8, iOS Agent and SSH methods. Added the ability to extract data from iPhone 14, iPhone 14 Plus, iPhone 14 Pro and iPhone 14 Pro Max via iTunes backup procedure. Added the ability to extract encryption keys stored in the Android Keystore of Android devices based on the Qualcomm chipsets: MSM8917, MSM8937, MSM8940, MSM8953. Added the ability to bypass screen lock and decrypt data from MTK-based Android devices having TEE Kinibi and full-disk encryption (FDE). Added the ability to bypass screen lock and decrypt data from Android devices having TEE Trusty, File-Based-Encryption (FBE) and based on the following MTK chipsets: MT6765, MT6580.
0 Comments
Leave a Reply. |