unc0ver: ~13.5 https://unc0ver.dev/
checkra1n: ~13 (14 & A10+ experimental) https://checkra.in/
- download checkra
- connect your iPhone via USB
- start JB on checkra
| #!/jb/bin/bash | |
| CYCRIPT_PORT=1337 | |
| function help { | |
| echo "Syntax: $0 [-p PID | -P appname] [-l /path/to/yourdylib | -L feature]" | |
| echo | |
| echo For example: | |
| echo " $0 -P Reddit.app -l /path/to/evil.dylib # Injects evil.dylib into the Reddit app" | |
| echo " or" | 
unc0ver: ~13.5 https://unc0ver.dev/
checkra1n: ~13 (14 & A10+ experimental) https://checkra.in/
| git log --author="Linus Torvalds" --date=iso | perl -nalE 'if (/^Date:\s+[\d-]{10}\s(\d{2})/) { say $1+0 }' | sort | uniq -c|perl -MList::Util=max -nalE '$h{$F[1]} = $F[0]; }{ $m = max values %h; foreach (0..23) { $h{$_} = 0 if not exists $h{$_} } foreach (sort {$a <=> $b } keys %h) { say sprintf "%02d - %4d %s", $_, $h{$_}, "*"x ($h{$_} / $m * 50); }' | |
| { | |
| "AppleTV2,1": "Apple TV 2", | |
| "AppleTV3,1": "Apple TV 3", | |
| "AppleTV3,2": "Apple TV 3", | |
| "AppleTV5,3": "Apple TV 4", | |
| "AppleTV6,2": "Apple TV 4K", | |
| "iPad1,1": "iPad", | |
| "iPad2,1": "iPad 2", | |
| "iPad2,2": "iPad 2", | |
| "iPad2,3": "iPad 2", | 
| #/usr/bin/bash | |
| # strings to look for in our file | |
| # Note: you could just parse the whole file. But if you put in a bad password your IP | |
| # could end up on the bad guy list | |
| declare -a badstrings=("Failed password for invalid user" | |
| "input_userauth_request: invalid user" | |
| "pam_unix(sshd:auth): check pass; user unknown" | |
| "input_userauth_request: invalid user" | |
| "does not map back to the address" | |
| "pam_unix(sshd:auth): authentication failure" |