Skip to content

jailbreame/jailbreakme

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Jailbreak Me 13.37

A webbased jailbreak solution unifying existing jailbreak me solutions and new ones.

Created by Sem Voigtländer

Rules

  • Please respect the work of all developers who have made this possible
  • Please pay attention to the license in this repository
  • Do not in any form use the code in this repository for malware or data exfiltration.
  • When using the logic or code used in this repository all developers should be accredited as mentioned in the credits.
  • Jailbreaking with this is fun but be aware of the security risks of not updating your main device, anyone can use these bugs to spy or harm your device.

Support

  • 8.4.1 & 9.3 up to 9.3.3 & 11.3.1 (64-bit)
  • 3.1.2 up to 4.0.1 & 8.4.1 and 9.1 up to 9.3.4 (32-bit)

64-bit devices

11.3.1: iPhone 8, 8+, X (more to come)

This uses Ian Beer's empty_list as a payload. You can read about this exploit here: https://github.com/MTJailed/jailbreakme/blob/master/DOCS/Emptylist-11.3.1-Writeup.md

9.3 - 9.3.x: All devices (Thanks to Luca Todesco)

This uses Pangu NvWaStone as a payload and has been written by Luca Todesco (@qwertyoruiopz).

Nvwastone slides by Pangu: https://www.blackhat.com/docs/us-16/materials/us-16-Wang-Pangu-9-Internals.pdf

Extended writeup about nvwastone by Jonathan Levin: http:https://newosxbook.com/articles/nuwashi.pdf

Simple writeup about nvwastone by Nettitude Labs: https://labs.nettitude.com/blog/what-is-the-jailbreak-for-ios-9-3-3-actually-doing-part-1/

8.4.1 (soon)

This will use the work of Tihmstar and use EtaSon?? as a payload.

32-bit new devices

10.3.3: Coming in the far future (Can't make promises)

9.3.5: Coming in the far future (Can't make promises)

9.1 - 9.3.4: All devices (Thanks to Tihmstar)

This uses HomeDepot as a payload. The webkit exploit has been written by Tihmstar.

Vulnerabilites used in this jailbreak also go under the name Pegasus.

Homedepot on the iPhone wiki: https://www.theiphonewiki.com/wiki/Home_Depot

8.4.1: (soon)

This will use the work of Tihmstar and use EtaSon?? as a payload.

7.1 - 7.1.2: (Soon)

Neat vulnerability in CoreGraphics at the time can gain arbitrary code execution.

Might need manual patching of the dyld_shared_cache for newer devices.

At this time the exploit is just a demo of gaining code execution, any contributions are welcome.

Will use the evasi0n jailbreak.

Talk about evasi0n at 34C3 by Arg: https://mirror.netcologne.de/CCC//congress/2017/h264-hd/34c3-8720-eng-iOS_kernel_exploitation_archaeology.mp4

Writeup: http:https://www.binamuse.com/papers/CoreGraphicsInformationLeakReport.pdf

Poc: https://github.com/feliam/CVE-2014-4378 by @feliam

32-bit ancient devices (Thanks to Comex)

How to compile: https://mirrors.sipsik.net/domonkos.tomcsanyi.net/index.html%3Fp=329.html

4.3.3: iPad 1, iPad 2, iPhone 3GS, iPhone 4 GSM, iPod 3rd gen, iPod 4th gen

4.3.2: iPad 1, iPhone 3GS, iPhone 4 GSM, iPod 3rd gen, iPod 4th gen

4.3: iPad 1, iPhone 3GS, iPhone 4 GSM, iPod 3rd gen, iPod 4th gen

4.2.8: iPhone 4 CDMA

4.2.7: iPhone 4 CDMA

4.2.6: iPhone 4 CDMA

Credits

  • Niklas B
  • Tihmstar
  • Luca Todesco
  • Comex
  • PanguTeam
  • Ian Beer
  • Jonathan Levin (For the jailbreak toolkit)
  • Sem Voigtländer (just a techie)

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages