Skip to content

[iOS] netcat gui app, for using the 10.1.x mach_portal root exploit on device

Notifications You must be signed in to change notification settings

vgmoose/nc-client

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

nc-client

netcat client for iOS

Description

Connect to a server on a port and send/receive bytes over the network.

This app was developed to be an on-device solution for connecting to the iOS kernel exploit published by Google's Project Zero. In particular, the exploit provides access to a root shell on port 4141, and with this app it can be connected to at localhost:4141 from the device itself.

License

cc by-nc-sa

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Based on BSD's netcat.

Screenshots

terminal prompt

About

[iOS] netcat gui app, for using the 10.1.x mach_portal root exploit on device

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages