13 Followers
20 Following
5 Posts

https://github.com/opa334/darksword-kexploit

Unlike other repos, this one was not written by generative AI.

WIP

GitHub - opa334/darksword-kexploit: iOS <=26.0.1 DarkSword Kernel Exploit reimplemented in Objective-C (WIP)

iOS <=26.0.1 DarkSword Kernel Exploit reimplemented in Objective-C (WIP) - opa334/darksword-kexploit

GitHub

@justus61 @Pixav @opa334

So this is actually an error I didn't notice originally (though others initially didn't notice it either), but basically while Google says it was patched in 17.5, the CVE it associates with it was patched in 17.4...

While I suppose it could be that the associated CVE is wrong, more than likely it's probably Google listing the wrong version for some reason (there's other errors there too, though nothing like that that is relevant).

@Pixav @opa334

so the kexploit that the Coruna kit chain uses on later versions (Gruber) only supports up to 17.2.1 (patched in 17.3), that's the basis of where we were originally

*but*, the PPL/SPTM Bypasses were not patched until 17.4, so they presumably work up to 17.3.1

@Pixav @opa334

kexploit probably will, but a jailbreak wouldn't be possible (as 26.x is arm64e only for iOS/iPadOS, and arm64e needs a PPL/SPTM (depending on device) Bypass

best cases for a jailbreak now (assuming everything turns out as I optimistically understand it) would be:
- arm64 semi-untether up to 18.7.1 (including 15.x/16.x/17.x EoL)
- arm64e jailbreak up to 17.3.1 (using PPL/SPTM Bypasses from Coruna chain)