This program is definitely not spyware.
Run it on your 64-bit iOS device as soon as possible.
Your compliance will be rewarded.
Frontend and WebKit exploit are in
Kernel exploit is in
Post-exploitation is in
DoubleH3lix and Meridian can be built independently into static libraries with
make headless and
make all respectively, in their directories.
Those are then used to build the
/glue, which is the binary that is ran from JIT after the WebKit exploit. Can be built with just a
make, and will build all dependencies as needed.
And that is all finally strung together with the WebKit exploit by running
/root, which will again build dependencies as needed.
We originally wanted to backport the WebKit patch to 10.x, but ultimately gave up.
/patch for details, but the gist is:
One part of the WebKit bug was incorrect predictions in
JSC::DFG::clobberize, which is basically a huge switch-case. The fix for that was to re-route some values to blocks that are already used for other values.
On the versions we checked, the compiler had generated jump tables for that, so our idea would've been to just find and patch all those jump tables, since the correct code would already be present.
The issue is that the values that everything depends on have changed hundreds of times over the lifetime of iOS 10 (yes, much more frequently than there have been iOS releases), and there seem to be no landmarks anywhere nearby in code, so it's virtually impossible for us to determine which values to patch. :(