A webbased jailbreak solution unifying existing jailbreak me solutions and new ones.
Created by Sem Voigtländer
- Please respect the work of all developers who have made this possible
- Please pay attention to the license in this repository
- Do not in any form use the code in this repository for malware or data exfiltration.
- When using the logic or code used in this repository all developers should be accredited as mentioned in the credits.
- Jailbreaking with this is fun but be aware of the security risks of not updating your main device, anyone can use these bugs to spy or harm your device.
- 8.4.1 & 9.3 up to 9.3.3 & 11.3.1 (64-bit)
- 3.1.2 up to 4.0.1 & 8.4.1 and 9.1 up to 9.3.4 (32-bit)
This uses Ian Beer's empty_list as a payload. You can read about this exploit here: https://github.com/MTJailed/jailbreakme/blob/master/DOCS/Emptylist-11.3.1-Writeup.md
This uses Pangu NvWaStone as a payload and has been written by Luca Todesco (@qwertyoruiopz).
Nvwastone slides by Pangu: https://www.blackhat.com/docs/us-16/materials/us-16-Wang-Pangu-9-Internals.pdf
Extended writeup about nvwastone by Jonathan Levin: http://newosxbook.com/articles/nuwashi.pdf
Simple writeup about nvwastone by Nettitude Labs: https://labs.nettitude.com/blog/what-is-the-jailbreak-for-ios-9-3-3-actually-doing-part-1/
This will use the work of Tihmstar and use EtaSon?? as a payload.
10.3.3: Coming in the far future (Can't make promises)
9.3.5: Coming in the far future (Can't make promises)
This uses HomeDepot as a payload. The webkit exploit has been written by Tihmstar.
Vulnerabilites used in this jailbreak also go under the name Pegasus.
Homedepot on the iPhone wiki: https://www.theiphonewiki.com/wiki/Home_Depot
This will use the work of Tihmstar and use EtaSon?? as a payload.
Neat vulnerability in CoreGraphics at the time can gain arbitrary code execution.
Might need manual patching of the dyld_shared_cache for newer devices.
At this time the exploit is just a demo of gaining code execution, any contributions are welcome.
Will use the evasi0n jailbreak.
Talk about evasi0n at 34C3 by Arg: https://mirror.netcologne.de/CCC//congress/2017/h264-hd/34c3-8720-eng-iOS_kernel_exploitation_archaeology.mp4
Writeup: http://www.binamuse.com/papers/CoreGraphicsInformationLeakReport.pdf
Poc: https://github.com/feliam/CVE-2014-4378 by @feliam
How to compile: https://mirrors.sipsik.net/domonkos.tomcsanyi.net/index.html?p=329.html
- Niklas B
- Tihmstar
- Luca Todesco
- Comex
- PanguTeam
- Ian Beer
- Jonathan Levin (For the jailbreak toolkit)
- Sem Voigtländer (just a techie)