xerub / acornLinks
untethered+unsandboxed code execution in iOS 11
☆189Updated 5 years ago
Alternatives and similar repositories for acorn
Users that are interested in acorn are comparing it to the libraries listed below
Sorting:
- iOS 12.0-13.3 tfp0☆153Updated 5 years ago
- Spice - an unfinished iOS 11 untether☆112Updated 4 years ago
- iOS 10.0-12.2 tfp0☆131Updated 6 years ago
- Tool for getting and setting nonce without triggering KPP/KTRR/PAC.☆113Updated 2 years ago
- Lib kernel r/w☆189Updated 4 years ago
- Give me tfp0, I give you jelbrek☆260Updated 5 years ago
- An iOS kernel exploit for iOS 11 through 12.1.2. Non-SMAP (<=A9) devices only.☆80Updated 6 years ago
- iOS ARM64 kernel patchfinder☆77Updated 6 years ago
- iOS system call/Mach trap interception for checkra1n'able devices☆159Updated 4 years ago
- A arm offsetfinder. It finds offsets, patches, parses Mach-O and even supports IMG4/IMG3☆149Updated 8 months ago
- 64-bit iOS boot image patcher written in C☆145Updated 3 years ago
- An iOS kernel exploit for iOS 11 through 12.1.2. Works on A7 - A11 devices.☆103Updated 6 years ago
- Lockdown related research, tools and POCs.☆90Updated 6 years ago
- An incomplete iOS 11.2 -> iOS 11.3.1 Jailbreak☆164Updated 2 years ago
- getf tfp0 on iOS 12.0 - 12.1.2☆65Updated 6 years ago
- iOS Kernel Decompressor☆90Updated 5 years ago
- kernel exploit for Apple iOS 13.X☆185Updated 5 years ago
- multi_path with root and sandbox escape☆101Updated 7 years ago
- A simplistic python tool that assists in automating iOS firmware decryption.☆91Updated 6 years ago
- low effort jb☆140Updated 7 years ago
- ios iokit fuzzer (really probably isn't that useful anymore tbh)☆62Updated 8 years ago
- Analyzes a binary iOS kernel to determine function offsets and where to apply the canonical jailbreak patches.☆66Updated 8 years ago
- port of checkm8 to C☆140Updated last year
- iBoot-1145.3 Image3/heap stack RE (+unholy tools)☆84Updated last year
- Checkm8 PoC tool for A8, A8X and A9 devices that allows you to boot untrusted images (macOS only, credits: checkra1n team).☆90Updated 4 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆110Updated 6 years ago
- Fork of PongoOS which can be run in QEMU☆68Updated 4 years ago
- IDAPython loader to help with AArch64 iBoot, iBEC, and SecureROM reverse engineering☆262Updated 3 years ago
- IOSurface exploit☆226Updated last year
- ☆67Updated 3 years ago