Today, I've got for you the tutorial on how to create a CFW (custom-made firmware) for iCloud Bypass on iPhone 5 iOS 9.3.3 using Patched Setup.App and LibiMobileDevice for NAND Attack.
This is a full tutorial covering all parts in detail and should not pose any difficulties on beginners, but if you feel like not understanding a part of it, you can check out the F.A.Q. page (down bellow) or you can ask me a question (if the answer is NOT already in the F.A.Q.).
The NAND attack works using a flaw in ASR (Apple System Restore). Actually, ASR firstly copies the payload on the phone's NAND, before checking it's hash, thus creating a cache file of the entire ROOT File System, that we can deploy by forcing the Partitioning NAND (28) function in LibiMobileDevice.
This is still a work in progress, as you can also see from the video, it might still give errors, it is your turn to try to debug them, and check the F.A.Q. page and the channel for fixes. Some devices are not vulnerable. Especially the 16 GB devices who seem to rarely cache the files due to the limited space. But his is not a general rule. Trying this method is free, and will remain free.
This is the only thing you can really try on your locked device. The other method that works, is changing the motherboard which is not very cheap and most of the times, results in another scam because people sell locked motherboards on eBay as unlocked and the story loops. Pay attention!
Some parts require OS X (MAC or Virtual Box on Windows)!
For legal and personal use only. You are the only one liable for the way you decide to use this tutorial. For Educational use.
All the tools are in the description of the video.