53 Followers
9 Following
5 Posts
Some demo about running Virtual iPhone using Apple Virtualization framework:
https://youtu.be/3vvrU0YGKCQ
Running Virtual iPhone using Apple Virtualization

YouTube
I have posted a write-up for those who are interested in building virtual iPhone.
If have any further questions, please feel free to reach out via DM, Thanks.
https://github.com/wh1te4ever/super-tart-vphone-writeup
GitHub - wh1te4ever/super-tart-vphone-writeup

Contribute to wh1te4ever/super-tart-vphone-writeup development by creating an account on GitHub.

GitHub

[Release]
Re-jailbreak Utility for iOS 12 via WebKit Exploit

Supports only Chimera‑jailbroken A7–A10/X devices.

Live Link:
http://jbme.h4ck.kr

Source code:
https://github.com/wh1te4ever/totally-not-spyware-v2

Tested on iOS 12.0.1, 12.1.1, 12.1.4, 12.3.1, and 12.4.2 on iPhone 6s; 12.5.7 on iPhone 5s; and 12.2 on iPad Air 1 (also 12.4.1 on iPhone 6s, thanks MasterMike)

Multiple attempts may be required to successfully trigger the exploit.

Document

another 1day practice: CVE-2025-31258 (patched in macOS 15.5)
Escaped macOS sandbox, but partial.

Source Code:
https://github.com/wh1te4ever/CVE-2025-31258-PoC

Demo Video:
https://youtube.com/watch?v=GlReVUh_4W4

GitHub - wh1te4ever/CVE-2025-31258-PoC: 1day practice - Escape macOS sandbox (partial) using RemoteViewServices

1day practice - Escape macOS sandbox (partial) using RemoteViewServices - wh1te4ever/CVE-2025-31258-PoC

GitHub
GitHub - wh1te4ever/WebKit-Bug-256172 at ios-arm64

Safari 1day RCE Exploit. Contribute to wh1te4ever/WebKit-Bug-256172 development by creating an account on GitHub.

GitHub