Search results

Jump to: navigation, search
  • '''Saffron''' (also known as '''JailbreakMe 3.0''') is a [[userland]] untethered [[jailbreak]] from [[User:comex|comex]] that utilizes [[Jailbr * [[IOMobileFrameBuffer Privilege Escalation Exploit]]
    3 KB (410 words) - 01:07, 17 September 2021
  • ...hat links here"). Now also [[Saffron]] links here. Is this the same kernel exploit? --[[User:Http|http]] 00:21, 7 July 2011 (UTC) ...put needs to be moved. I'm confused since there was no common name for the exploit he created. I saw it in Saffron and assumed it was the new one because of t
    2 KB (396 words) - 08:42, 16 July 2011
  • ..., C, C++, Pyhton, Exploitation and etc. After you can say that you made an exploit :) --[[User:Zmaster|Zmaster]] 07:52, 12 December 2011 (MST) ...ing my tools in said language (probably). I specifically said it is not an exploit. And anyway that doesn't justify deleting this page. As I said before Bluef
    9 KB (1,653 words) - 18:42, 7 February 2013
  • '''Absinthe''' is the [[S5L8940|A5]] [[userland]] jailbreak tool for [[N94AP|iPhone 4S]] and [[iPad 2]] on iOS 5.0 (iPhone ==Exploit==
    5 KB (735 words) - 13:30, 8 December 2021
  • ...rk on the 4S, seeing as a pwn'd anything above userland requires a bootrom exploit. --[[User:Rdqronos|rdqronos]] 12:21, 21 January 2012 (MST)
    2 KB (340 words) - 13:50, 23 March 2015
  • :It would also be cool to have the versions the exploit works on, the discoverer, and the first program to implement it. --[[User:G ...nce there isn't any bootrom exploits for those). Modern jailbreaks require userland exploits to be untethered, but iOS 5.1 patched the vulnerabilities we have
    11 KB (1,774 words) - 20:12, 24 March 2017
  • ...o presented it at [[HiTB]] 2012 in Kuala Lumpur. This vulnerability allows userland processes access to the first page of the kernel, because the <code>copyin< ...ll never see the light of day. [[i0n1c]] responded that it is difficult to exploit it in a stable way and he would like to see a description for it.
    2 KB (373 words) - 15:43, 18 August 2013
  • ...ailbreak]] without the need to restore and use the desktop tool. It is a [[userland]] [[jailbreak]]. [[User:posixninja|P0sixninja]] released the [https://githu ...that cancels uninstallation if the device is not vulnerable to [[Limera1n Exploit|limera1n]]), as well as <code>postrm</code> and <code>extrainst_</code> bin
    21 KB (3,060 words) - 23:12, 16 September 2021
  • ...rland Exploits]] category that would hold [[HFS Heap Overflow]], [[libTiff Exploit]], etc. --[[User:5urd|5urd]] ([[User talk:5urd|talk]]) 00:41, 11 February 2
    894 bytes (134 words) - 00:41, 11 February 2013
  • ...earch in the filesystem, kernel... for all types of exploits(code signing, userland, kernel...) * '''[[Time exploit]]'''
    3 KB (374 words) - 09:31, 29 March 2017
  • ...rability that is used with an exploit in a jailbreak - or by writing a new exploit. Remember that it's not allowed to add yourself to that category. Instead o ...d exploit but very functional and based off of redsn0w that implements our exploit now if you wanna get your thumb out of your buts and pay attention it would
    46 KB (7,639 words) - 14:28, 28 March 2017
  • ...co (qwertyoruiop)]]. It's based on the [[checkm8 Exploit|checkm8]] bootrom exploit released by [[User:axi0mX|axi0mX]]. checkra1n supports iOS 12.0 and newer, * Restructured loaderd and friends into separate launch daemons to survive userland reboot and removed insult from daemon name
    12 KB (1,861 words) - 13:02, 22 September 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)