Fugu 14 jailbreak5/19/2023 ![]() Additionally, the fast untether (in case it actually works) is more UNSAFE than the "slow" untether.The fast untether (disabled unless you edit the source code) HAS NOT BEEN TESTED ON A REAL DEVICE - DO NOT USE IT.Messing around with the untether may BOOTLOOP your device.(Jailbreak Developers: You can make your jailbreak untethered just by creating a CLI version that supports libkrw, copying it to /.Fugu14Untether/autorun/ and writing a trust cache to /.Fugu14Untether/trustcaches/).Supports Siguza's libkrw library (load /usr/lib/libkrw/libFugu14Krw.dylib and call krw_initializer). ![]() Executables put in /.Fugu14Untether/autorun/ will be launched during boot (make sure to also create a trust cache for your executable!).Trustcaches put in /.Fugu14Untether/trustcaches/ will be loaded automatically.A simple TCP shell is available on port 1337.The kernel exploit is extremely reliable (it will never trigger a kernel panic).Note that all of this code was written specifically for arm64e, so some changes are required to add arm64 support to the untether. However, it is in theory possible to install the untether on them (e.g. Support for lower versions (down to 14.2) can be added by editing arm/shared/ClosurePwn/Sources/ClosurePwn/PwnClosure.swift and arm/shared/KernelExploit/Sources/KernelExploit/offsets.swift.Īrm64 devices are not supported because the exploit to install the Fugu14 App does not work on these devices. Supported Devices/iOS Versionsįugu14 should support all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1. Fugu14 is an (incomplete) iOS 14 Jailbreak, including an untether (persistence), kernel exploit, kernel PAC bypass and PPL bypass.
0 Comments
Leave a Reply. |