wang

20 posts

wang

wang

@n_hcci

Katılım Ocak 2017
35 Takip Edilen2 Takipçiler
Huy Nguyen
Huy Nguyen@Little_34306·
I normally do the thing i'd love the best 😉
English
30
29
368
33K
Michael
Michael@MasterMike88·
For what it’s worth: there is a kernel exploit implementation of this that has been worked on at github.com/opa334/darkswo…. And so, for the first time in 2 years, 2 months, 3 weeks, and 2 days, there is a new kernel exploit and new jailbreak-relevant exploit.
Michael@MasterMike88

For the first time in over two years, there is set to be a new kernel exploit for up to iOS/iPadOS 18.7.1 and 26.0.1 - including the latest EoL versions for 15.x (presumed)/16.x/17.x. [Note: Just like the Coruna kit chain a few weeks ago, stuff here is subject to change/revision.] This is - as you may or may not already be aware of - the result of another 1-click malware chain, known as DarkSword. You can read more about this chain from Google at cloud.google.com/blog/topics/th… (see reply though for a note on a previous Google inaccuracy with Coruna). I'm not going to into depths on how stuff is coming from this chain because: - We do not need a repeat of how certain things about Coruna were handled - Linking to anything directly would legitimately result in this account probably being nuked... which I am not inclined to deal with thank you very much But, suffice to say, the whole chain is public to a degree, and stuff is absolutely coming from this chain. Now, that raises the obvious question - What is the state of anything new for jailbreaking? It's worth noting that the DarkSword chain does not utilize any PPL/SPTM Bypass (needed for arm64e jailbreaks on 15.x and later), which means that we aren't getting any new exploits from that side of the coin. But, we still have the PPL/SPTM Bypasses from the Coruna exploit kit. Even better, two of them (Sparrow and Rocket) were not patched until iOS/iPadOS 17.4, which is actually one minor version later than when the last kernel exploit in the kit (Gruber) was patched (17.3). So, assuming everything goes as optimistically as reasonably possible: - arm64 could get a semi-untethered jailbreak up to iOS/iPadOS 18.7.1 (including EoL 15.x/16.x/17.x) - arm64e could get a proper jailbreak up to iOS/iPadOS 17.3.1

English
6
9
166
20.8K
wang
wang@n_hcci·
@duongduong0908 I've already turned on the VPN and connected to the WiFi, but it still says it can't connect.
wang tweet media
English
2
0
0
8.9K
✨𝗬𝗮𝗻𝗴𝗝𝗶𝗶𝗶メ3105🍉
EnsWilde Release 2.0 Updated to the new UI for version 2.0 Improved stability Fixed an app crash when the pairing file is corrupted or when updating to a new pairing file - Allow editing the MobileGestalt file - zPatch Custom feature github.com/YangJiiii/EnsW…
✨𝗬𝗮𝗻𝗴𝗝𝗶𝗶𝗶メ3105🍉@duongduong0908

Sorry for the delay with EnsWilde 2.0. I’m currently testing the zPatch Custom feature before releasing it. #EnsWilde

English
21
10
57
17.2K
wang retweetledi
Alfie
Alfie@alfiecg_dev·
CVE-2023-32434 is much more powerful than just a PUAF - it can also be used as a physical mapping primitive. This allows for a deterministic exploit that doesn’t use any memory corruption. I don’t have a complete exploit yet, but so far it’s been a fun project!
Alfie tweet media
English
10
34
330
83.4K
t0mi
t0mi@t0mi292·
Who wants a free copy of LYNX 2? 🤔 Just like & share the tweet and comment, why YOU should get a copy! In order to participate in the raffle, you must follow @MTAC8 & @t0mi292! I am giving away a total of 10 copies of Lynx 2, the best tweak atm. Good luck to everyone. 😊
t0mi tweet media
English
125
111
160
33.3K
wang
wang@n_hcci·
@t0mi292 @MTAC8 I've always wanted to use Lynx2. Unfortunately, I'm still a student in our country. This price is a little expensive for students, but thank you.
English
0
0
1
49
wang
wang@n_hcci·
@opa334dev I think the good thing is in your next posting.
English
0
0
1
2.2K
roothide
roothide@roothideDev·
works well on iphoneSE gen1 ios15, arm64 device. well it does work on ios14.0 ~ ios17.0, A9~A16,M1,M2, (A17 maybe? unless there is an installation method) , for @opa334dev trollstore.
roothide tweet media
English
20
13
175
34.2K
wang
wang@n_hcci·
@RootHideDev Ness, look forward to the release.
English
0
0
0
1K
roothide
roothide@roothideDev·
got tweak auto loaded for appstore apps, with full JIT(MSHookFunction) support. so tweak can work with all apps now.
English
53
43
342
100.5K
Huy Nguyen
Huy Nguyen@Little_34306·
I have a few focus stuffs rn: - Tweak injection for app (TS) - Updating misaka to support A12X and A12Z - Updating misaka to support AppleTV (tvOS from 16.0-16.5) Lmk what should i focus on. I'm kinna lazy because xmas upcoming 🎄
English
39
9
139
25.1K
wang
wang@n_hcci·
@opa334dev Thank you for your efforts
English
0
0
0
23
wang retweetledi
opa334@infosec.exchange
[email protected]@opa334dev·
Everyone can update to TrollStore 2, the new CT bypass used should have no downsides and supports all previously supported versions aswell. Obviously only newly installed apps will use the new bypass but it doesn't matter, previously installed apps will still work.
English
34
39
402
78.3K
parkm04/공원
parkm04/공원@parkm04·
@n_hcci if you tell me the original code, I'll build for that code
English
2
0
0
190
parkm04/공원
parkm04/공원@parkm04·
App for changing iPhone to US varient. using MDC
English
2
0
0
107