Clutch shell smashing with this decryption tool belongs to static shell smashing.
There is also a dynamic shell breaking method, which is to directly copy the Mach-O file decrypted by Apple and load it into memory. The typical representative of this is dumpdecrypted.
After the shell is smashed, the path will be given to us, and we can take out the ipa package after the shell is smashed through ifunBox or through scp instruction. So it worked ~ hehe?
Finally get the decrypted Mach-O file, and we can do whatever we want ~ ~