Search results

Jump to: navigation, search
  • ...or iOS12, 17xx for iOS13), likely an artifact of misconfiguration on Apple's side, since it matches the source version of the kernelcache builder. ...ract kexts anymore from these caches). Joker has been superseded by jtool2's --analyze option, which can effectively symbolicate 1000s (3,000-8,000, dep
    20 KB (2,721 words) - 22:02, 13 December 2021
  • '''Victoria''' is Apple's internal codename for [[wikipedia:Nike+iPod|Nike+iPod]] functionality avail
    435 bytes (46 words) - 16:29, 14 November 2013
  • ...5L [[NOR]] (or [[NAND]]) that stores vital information such as your device's model number and serial number.
    617 bytes (104 words) - 11:13, 24 March 2017
  • ...ointer to the bdev list structure, task list structures for the Secure ROM's scheduler, as well as the addresses of the hardware SHA1 registers. All of ...File Format|IMG3]], so that the payload code can be placed within the LLB's IMG3.
    11 KB (1,918 words) - 17:13, 22 October 2021
  • ...it CAN NOT be directly jailbroken from its release. In addition, NitroKey's irresponsible handling gave Apple enough time to add the [[ECID]] tag to th
    1 KB (242 words) - 23:14, 16 September 2021
  • ...nd firmware you are trying to flash). On [[N51AP|iPhone 5S]] and newer, it's also responsible for updating the [[Secure Enclave|SEP]] via [[seputil]]
    626 bytes (107 words) - 13:32, 5 September 2017
  • ...taller, and update to 1.1.2 in [[iTunes]], and use the [[iPhone Dev Team]]'s jailbreak utility, [[touchFree]], written by [[User:Planetbeing|planetbeing
    2 KB (226 words) - 20:44, 12 March 2017
  • ...s to restore to a custom [[IPSW File Format|IPSW]], akin to [[PwnageTool]]'s DFU button. * Allows you to "deactivate" a hacktivated phone, so sbingner's [http://www.bingner.com/SAM.html Subscriber Artificial Module] (SAM) can tr
    23 KB (3,037 words) - 10:20, 15 May 2021
  • *pf2 (Used for [[User:comex|comex]]'s [[kernel]] patch) *libgmalloc.dylib (Used for [[User:comex|comex]]'s [[Incomplete Codesign Exploit]])
    562 bytes (73 words) - 11:36, 28 August 2015
  • ...]] page or from the <code>Info.plist</code> file underneath [[PwnageTool]]'s <code>/FirmwareBundles</code> folder. ...3.0 (what beta?), Apple began using Snow Leopard to package the [[ramdisk]]s. This results in some zero sized files in the disk image if you don't use S
    8 KB (1,342 words) - 08:42, 7 February 2022
  • ...lder [[:/usr/etc]] exists. SSH into your iPhone and then, type: ''minicom -s''.
    2 KB (359 words) - 14:12, 7 July 2014
  • And this is just phase one. There's planned support for differential paths (run twice and graphical compare), a ...running a web server that any webkit browser can run the front end in. It's fully cross platform. Initially, we plan only to support ARM, but it should
    3 KB (594 words) - 13:07, 17 September 2021
  • Then follow the How To's
    1 KB (158 words) - 08:29, 13 October 2015
  • ...0x24000 Segment Overflow]] exploit. Many of them are susceptible to geohot's bootrom exploit (originally found in [[limera1n]]), which allows unsigned c ...(Bootloader)|iBoot]] exploits won't be so useful for [[tethered jailbreak]]s, because such exploits will be closed in new firmwares. [http://iphonejtag.
    3 KB (399 words) - 09:52, 26 March 2017
  • ...0|09}}, which led to a delay in greenpois0n's release (to implement geohot's exploit, not SHAtter). * Use an exploit that Apple already knew about (newer [[iBoot]]s shows the exploit patched)
    4 KB (585 words) - 23:37, 16 September 2021
  • ...]] [[Baseband Firmware|baseband]] in iOS 4.1 beta (developers only). There's no public [[unlock]] for it.
    166 bytes (23 words) - 11:40, 7 October 2015
  • j's are junk
    584 bytes (77 words) - 00:35, 28 January 2013
  • ...y.blogspot.ca/2012/01/automatic-ssh-ramdisk-creation-and.html#more msftguy's blog on SSH ramdisk creation] * [https://github.com/msftguy/ssh-rd msftguy's SSH ramdisk source code on Github]
    1 KB (187 words) - 16:03, 4 November 2022
  • ...normal registers, like arg1 in R0/X0, as usual. Syscall # goes in IP (that's intra-procedural, not instruction pointer!), a.k.a R12/X16. ...ese can be found at [http://newosxbook.com/index.php?page=Appendix ''Wiley's OS X and iOS Internals'' online appendix]. The joker tool (shown below) can
    20 KB (2,465 words) - 21:48, 2 February 2018
  • This page is a dump of the [[N88AP|iPhone 3GS]]'s [[Device Tree]].
    20 KB (2,417 words) - 09:09, 13 October 2015

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)