a toolbox for checkm8 exploit
This gui was made with Python3MacApp LearnerTemplate from @ios_euphoria
On A11 and A10 devices you must disable passcode, on ios 16 you must never set a passcode, if you had a passcode you have to restore with itunes
Here you can download the Palera1n loader ipa: Palera1n.ipa
How does it work: It boots the device with multiple patches required. On first run, it'll boot a ramdisk which dumps your onboard blob, creates a fakefs (if using semi tethered), installs the loader app, and patches your kernel.
Python3MacApp LearnerTemplate creator: ios_euphoria
-
- The ramdisk that dumps blobs, installs pogo to tips app, and duplicates rootfs is a slimmed down version of SSHRD_Script
- For modified restored_external
- Also helped Mineek getting the kernel up and running and with the patches
- Helping with adding multiple device support
- Fixing issues relating to camera.. etc by switching to fsboot
- iBoot64Patcher fork
-
- For the patching and booting commands
- Adding tweak support
- For patchfinders for RELEASE kernels
- Kernel15Patcher
- Kernel64Patcher
-
checkra1n for the base of the kpf
-
nyuszika7h for the script to help get into DFU
-
the Procursus Team for the amazing bootstrap
-
F121 for helping test
-
tihmstar for pzb/original iBoot64Patcher/original liboffsetfinder64/img4tool
-
xerub for img4lib and restored_external in the ramdisk
-
Cryptic for iBoot64Patcher fork, and liboffsetfinder64 fork
-
libimobiledevice for several tools used in this project (irecovery, ideviceenterrecovery etc), and nikias for keeping it up to date
-
Nick Chan general help with patches.
-
Serena for helping with boot ramdisk.
-
Thanks to Checkra1n for the checkra1n jailbreak