![]() ![]() The kernel exploit is extremely reliable (it will never trigger a kernel panic).Note that all of this code was written specifically for arm64e, so some changes are required to add arm64 support to the untether. However, it is in theory possible to install the untether on them (e.g. Support for lower versions (down to 14.2) can be added by editing arm/shared/ClosurePwn/Sources/ClosurePwn/PwnClosure.swift and arm/shared/KernelExploit/Sources/KernelExploit/offsets.swift.Īrm64 devices are not supported because the exploit to install the Fugu14 App does not work on these devices. Supported Devices/iOS Versionsįugu14 should support all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1. Fugu14 is an (incomplete) iOS 14 Jailbreak, including an untether (persistence), kernel exploit, kernel PAC bypass and PPL bypass.
0 Comments
Leave a Reply. |