This app allows you to install and manage applications contained in a single app, using certificate pairs and various installation techniques to allow apps to install to your device.
This is an entirely stock application and uses built-in features to be able to do this!
- Install applications via
idevice
or using aserver
. - Inspect and manage imported apps, certificates, and altstore sources.
- Globally configurable signing options, and even supports Adhoc signing.
- Advanced tweak support, using Ellekit for injection. Supports
.deb
and.dylib
files. - No tracking or analytics, ensuring user privacy.
- Of course, open source and free.
How Feather works is a bit complicated, with having multiple ways to install, app management, tweaks, etc. However, I'll point out how the important features work here.
To start off, we need a validly signed IPA. We can achieve this with Zsign, using a provided IPA using a .p12
and .mobileprovision
pair.
- Use a locally hosted server for hosting the IPA files used for installation, including other assets such as icons, etc.
- On iOS 18, we need a few entitlements:
Associated Domains
,Custom Network Protocol
,MDM Managed Associated Domains
,Network Extensions
- On iOS 18, we need a few entitlements:
- Make sure to include valid https SSL certificates as the next URL requires a valid HTTPS connection, for us we use *.backloop.dev.
- We then use
itms-services://?action=download-manifest&url=<PLIST_URL>
to attempt to initiate an install, by usingUIApplication.open
.
However, due to the changes with iOS 18 with entitlements we will need to provide an alternative way of installing. We have two options here, a way to install locally fully using the local server (the one I have just shown) or use an external HTTPS server that serves as our middle man for our PLIST_URL
, while having the files still local to us. Lets show the latter.
- This time, lets not include https SSL certificates, rather just have a plain insecure local server.
- Instead of a locally hosting our
PLIST_URL
, we use plistserver to host a server online specifically for retrieving it. This still requires a valid HTTPS connection. - Now, to even initiate the install (due to lack of entitlements from the former) we need to trick iOS into opening the
itms-services://
URL, we can do this by summoning a Safari webview to a locally hosted HTML page with a script to forcefully redirect us to that itms-services URL.
Since itms-services initiates the install automatically, we don't need to do anything extra after the process. Though, what we do is monitor the streaming progress of the IPA being sent.
- Establish a heartbeat with a TCP provider (the app will need this for later).
- For it to be successful, we need a pairing file and a VPN.
- Once we have these and the connection was successfully established, we can move on to the installation part.
- Before installing, we need to check for the connection to the socket that has been created, routed to
10.7.0.1
, if this succeeds we're ready.
- Before installing, we need to check for the connection to the socket that has been created, routed to
- When preparing for installation, we need to establish another connection but for
AFC
using the TCP provider. - Once the connection was established we need to created a staging directory to
/PublicStaging/
and upload our IPA there. - Then, using our connection to
AFC
we can command it to install that IPA directly. Similar toideviceinstaller
, but fully on your phone.
Due to how it works right now we need both a VPN and a lockdownd pairing file, this means you will need a computer for its initial setup. Though, if you don't want to do these you can just use the server way of installing instead (but at a cost of less reliability).
Visit releases and get the latest .ipa
.
Read the contribution requirements for more information.
Thanks to all my sponsors!! |
---|
![]() |
"samara is cute" - Vendicated |
- Samara - The maker
- idevice - Backend for builds with this included, used for communication with
installd
. - *.backloop.dev - localhost with public CA signed SSL certificate
- Vapor - A server-side Swift HTTP web framework.
- Zsign - Allowing to sign on-device, reimplimented to work on other platforms such as iOS.
- Nuke - Image caching.
- Asspp - Some code for setting up the http server.
- plistserver - Hosted on https://api.palera.in.
This project is licensed under the GPL-3.0 license. You can see the full details of the license here. It's under this specific license because I wanted to make a project that is transparent to the user thats related to certificate paired sideloading, before this project there weren't any open source projects that filled in this gap.
By contributing to this project, you agree to license your code under the GPL-3.0 license as well (including agreeing to license exceptions), ensuring that your work, like all other contributions, remains freely accessible and open.