Skadz

162 posts

Skadz

Skadz

@Forkazmodan

Official fake Skadz

Katılım Şubat 2016
69 Takip Edilen17 Takipçiler
Deni
Deni@DeniCodes·
@zeroxjf Would this work on 15 pro max on 18.1?
English
2
0
0
921
johnny
johnny@zeroxjf·
After much trial and error, proud to show off tweak injection on iOS 18; possibly for the first time ever? DarkSword injection into SpringBoard on iPhone 15 Pro Max running 18.6.2 🎉
English
30
43
360
30.1K
Skadz
Skadz@Forkazmodan·
@DeniCodes @zeroxjf Wanna know too , asked several times but no answer. Most people said ios 18.4-ios18.7, but i think should work on ios 18.1
English
1
0
1
73
johnny
johnny@zeroxjf·
Thanks to a tip from @khanhduytran0, I now have the extracted DS files getting dumped to /private/var/mobile/Media/Downloads/ in lieu of the highly unreliable remote server communication. I also now have the full chain repro up to 60-70%!
johnny tweet media
johnny@zeroxjf

Post-exploit data theft

English
3
12
143
20.9K
Skadz
Skadz@Forkazmodan·
@Hermes_tooll Good work man! What about ios18.1 on A18?
English
0
0
0
350
Skadz
Skadz@Forkazmodan·
@amfi_d Waht about below , such as ios 18.1
English
0
0
0
978
amfi
amfi@amfi_d·
DarkSword supports iOS 18.4 to 18.6.2 (22E240, 22E252, 22F76, 22G86, 22G90, 22G100)
Italiano
10
13
122
13.6K
teslaman3092
teslaman3092@tesla_man3092·
@amfi_d this might sound dumb but is there any hope for people(me) on 18.0.1 (below 18.4)?
English
1
0
2
2.1K
amfi
amfi@amfi_d·
I'm reverse-engineering DarkSword and found that it supports 26 iPhone models with only 34,000 offsets. That's crazy.
English
4
8
216
19.7K
johnny
johnny@zeroxjf·
@mattiekool Yes, with remnants of 18.6 code. But it's the full chain and could likely be adapted to any susceptible version with some adjustments
English
4
0
2
1.9K
johnny
johnny@zeroxjf·
DarkSword payloads have surfaced and appear to be a full iOS 18.4 staged chain with WebContent RCE, SB escape, a kernel PE/KRW bundle, and post-exploit logic for task ops, process injection, and data collection. Not going to publicly link the payloads. Legit researchers can DM me
English
14
22
227
21K
Huy Nguyen
Huy Nguyen@Little_34306·
How crazy Darksword and GHOSTBLADE are! shout out to @zeroxjf for the finding Unrelated: GHOSTBLADE also my fav comic from WLOP!
Huy Nguyen tweet mediaHuy Nguyen tweet media
English
4
13
174
37.6K
Skadz
Skadz@Forkazmodan·
@Lakr233 Ios18.1, 点击扫描-➕,弹出页面提示“已准备好扫描”,但是放上nfc卡没反应
中文
0
0
0
1.7K
砍砍.ᐟ
砍砍.ᐟ@Lakr233·
开源一个 NFC 的轮子,替换了我手上多年的老古董。 来玩!
砍砍.ᐟ tweet media
中文
29
31
442
100.5K
Techjunkie Aman
Techjunkie Aman@Techjunkie_Aman·
iOS 18 jailbreak… might not be that far. Coruna already proved: • Tweak injection works • .dylib loading works • System UI can be hooked Now DarkSword adds: • Website-based exploitation • Fileless execution (no install needed) • “Smash-and-grab” data extraction in minutes • Works just by visiting an infected page • Targets real devices at scale It can access things like: • Messages (iMessage, WhatsApp, Telegram) • Photos and files • Browser data • Even sensitive app data And the scary part: The exploit chain was left exposed. Meaning it can be reused. If these get combined… we could see a Coruna-level jailbreak for iOS 18. And this time? No cables. No sideloading. Just a webpage. Exploit News Source : Wired
Techjunkie Aman tweet media
English
12
18
169
23.7K
Skadz
Skadz@Forkazmodan·
@zeroxjf So what about ios 18.1?
English
0
0
3
364
johnny
johnny@zeroxjf·
Wild couple weeks for the iOS jailbreak community. 2 exploit chains in 2 weeks. ICYMI, there’s a new iOS 18 chain (details below). Payloads don’t appear to be in the wild, (good given how many are still on iOS 18), but likely means no imminent ability to adapt for a jailbreak.
Mateusz Krzywicki@krzywix

In collaboration with Lookout and Google (thank you 🙏) we have been working on tearing down and building detections for DarkSword - iOS exploit chain for iOS 18.4 - 18.7. Super excited for this research 🎉. Please update your iPhones. iverify.io/blog/darksword…

English
5
11
127
16.8K
Skadz
Skadz@Forkazmodan·
@krzywix So what about ios 18.1?
English
0
0
1
1.1K
Mateusz Krzywicki
Mateusz Krzywicki@krzywix·
In collaboration with Lookout and Google (thank you 🙏) we have been working on tearing down and building detections for DarkSword - iOS exploit chain for iOS 18.4 - 18.7. Super excited for this research 🎉. Please update your iPhones. iverify.io/blog/darksword…
English
15
83
344
86K
✨𝗬𝗮𝗻𝗴𝗝𝗶𝗶𝗶メ3105🍉
In the next version, EnsWilde will fully resolve all DDI-related issues and introduce a few new features. - Please do not ask me about support for other iOS versions. Read the GitHub page. It currently supports iOS 18.0 to 26.2 beta 1.
✨𝗬𝗮𝗻𝗴𝗝𝗶𝗶𝗶メ3105🍉 tweet media
English
7
2
46
7.6K
Skadz
Skadz@skadz108·
@Little_34306 @khanhduytran0 fyi people: this is an internal device. trollstore will never ever come to ios 26 on regular devices. in my personal opinion, this whole saga is incredibly misleading and is just a bunch of clout-chasing engagement bait, but last time i said that i got flamed so.. good job
English
3
5
70
5.1K
Duy Tran
Duy Tran@khanhduytran0·
Happy new year! Here is a 167gr iPhone driving macOS 15.6, with native M4 driver partially patched for A18
Duy Tran tweet media
English
77
456
7.5K
446K
Skadz
Skadz@skadz108·
@Little_34306 @khanhduytran0 genuinely what is the point of hyping this up if not to mislead people for clout what's even the point of releasing this? the only people that'd be able to use this are people you could likely just hand this to if needed, there's zero need for this to be public.
English
2
1
11
2.4K
Huy Nguyen
Huy Nguyen@Little_34306·
With @khanhduytran0's "AI" device release, here's a TrollFools fixed for iOS 17.5.1- I'm planning to make it support on higher iOS "AI" device since start from iOS 17.6 Apple did a thing place ldid into /var/jb/usr/bin/ldid to make sure it works fine github.com/34306/TrollFoo…
English
6
22
125
22.1K