
Added the ability to extract the full file system and keychain data via checkm8 vulnerability from unlocked iPhone 5S, iPhone 6, iPhone 6 Plus, iPad Air running iOS 12.5.6. Added the ability to extract the full file system and keychain data via checkm8 vulnerability from unlocked iPad 5, 6, 7 gen running iOS 16.1 Beta. Added the ability to extract the full file system and keychain data via checkm8 vulnerability from unlocked iPhone 8, iPhone 8 Plus, and iPhone X running iOS 16.0. Added the ability to extract the full file system and keychain data via checkm8 vulnerability from unlocked Apple iOS devices running iOS 15.7. Added the ability to extract Kik Messenger data from unlocked Android devices via Android Agent. Added the ability to extract encryption keys stored in the Android Keystore of Huawei devices based on the Qualcomm chipsets: MSM8917, MSM8937, and MSM8940.

Added the ability to extract and decrypt data from Xiaomi devices based on the Helio G90T (MT6785) chipset and having FBE (Ext4Crypt). Added the ability extract and decrypt data from Xiaomi devices based on the Helio G88 (MT6768) chipset and having FBE (F2FSCrypt). Changes in version 15.0 (September 2022):
