This program is definitely not spyware.
Run it on your 64-bit iOS device as soon as possible.
Your compliance will be rewarded.
[ Live version at totally-not.spyware.lol ]
Frontend and WebKit exploit are in /root
.
Kernel exploit is in /glue
.
Post-exploitation is in /glue/dep
.
DoubleH3lix and Meridian can be built independently into static libraries with make headless
and make all
respectively, in their directories.
Those are then used to build the payload
in /glue
, which is the binary that is ran from JIT after the WebKit exploit. Can be built with just a make
, and will build all dependencies as needed.
And that is all finally strung together with the WebKit exploit by running make
in /root
, which will again build dependencies as needed.
We originally wanted to backport the WebKit patch to 10.x, but ultimately gave up.
See /patch
for details, but the gist is:
One part of the WebKit bug was incorrect predictions in JSC::DFG::clobberize
, which is basically a huge switch-case. The fix for that was to re-route some values to blocks that are already used for other values.
On the versions we checked, the compiler had generated jump tables for that, so our idea would've been to just find and patch all those jump tables, since the correct code would already be present.
The issue is that the values that everything depends on have changed hundreds of times over the lifetime of iOS 10 (yes, much more frequently than there have been iOS releases), and there seem to be no landmarks anywhere nearby in code, so it's virtually impossible for us to determine which values to patch. :(
- The final
countdownproduct: Jake Blair - The entire frontend, website, etc.: FoxletFox
- WebKit exploit: Niklas Baumstark, with part of Samuel Groß' code patched in.
- Everyone credited for the DoubleH3lix and Meridian jailbreaks.