Dump non-encrypted iOS device tree extracted from im4p
iOS device tree files are not encrypted after iOS 10. So, with img4tool from @xerub ,
> img4 -image ./all_flash/DeviceTree.d22ap.im4p /tmp/d22ap-dt.bin Then we can do something like
> ./dtdump /tmp/d22ap-dt.bin or
> ./dtdump -v /tmp/d22ap-dt.bin -v means dump values in hexdecimal