Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Cicuta_virosa Alternatives
Similar projects and alternatives to cicuta_virosa
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
futurerestore
Discontinued A hacked up idevicerestore wrapper, which allows specifying SEP and Baseband for restoring [Moved to: https://github.com/m1stadev/futurerestore] (by marijuanARM)
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
cicuta_virosa reviews and mentions
- [Question] What is the name of the exploit used in Taurine and unc0ver for iOS 14.3? Looked around and couldn’t find anything :/
-
New Pegasus zero-click iPhone attack defeats Apple's Blastdoor protections
I can almost guarantee so many exploits wouldn't be sold to companies like Cellebrite or to foreign governments, or even given out for free, if Apple paid market rate for them. They won't though, because they prefer to reflect and obscure, pretending that the problem doesn't exist.
-
Please don't take this the wrong way
Okay, I KNOW I'm going to sound like an ETA kid, but let me assure you, I'm on iPadOS 14.6 anyways, so I'm going to be sticking to checkra1n for a while now. I heard there was some news for iOS 14.4-14.4.2 and possibly 14.5, hinted here, but not as likely. I've heard that they need a kernel exploit before anything can be declared finished, which makes sense. Then one got released. So then I was told to wait until all the iOS firmware that were affected were unsigned. Strange, but iOS 14.5 was signed at the time, so I went along with it. Then iOS 14.5 got unsigned. So why isn't unc0ver updated? I mean, it is a bit hasty, considering some of us are still blown away by the fact that the unc0ver team even came back, but what about the info I was heard?
-
If you’re currently jailbroken, save blobs!
Modernpwner, the team that found the iOS 14.3 and below exploits for jailbreaks (unc0ver and Taurine) has hinted at a possible bypass that could lead to a jailbreak for 14.5 (PAC bypass section of https://github.com/ModernPwner/cicuta_virosa). You could theoretically update to either one of these versions right now since they’re being signed, but given the time it takes for jailbreaks to become a thing, these versions might not be signed by Apple if or when a full jailbreak is released for them. You’d have to play the waiting game for a good while if you update now, and none of these exploits are guaranteed to be stable enough for a full fledged jailbreak anyways. That’s why blob saving is so powerful!
-
[Tip] If you’re on 14.3 or below, save blobs NOW.
With the release of iOS/iPadOS 14.5 and the public disclosure of security content for 14.5 (https://support.apple.com/en-us/HT212317), as well as the potential for another exploit for 14.5 from Modernpwner (PAC bypass section of https://github.com/ModernPwner/cicuta_virosa), updating looks enticing right now. However, you don’t have to lose your jailbreak and play the waiting game.
- [question] is there way way to make AirTag compatible with iOS 14.3 ( a tweak possibly ) ? I was planning to get one but i don’t wanna loose my jailbreak for it.
-
[Meta] Apple's "Spring Loaded" Event
If you remember how we got our 14.3 jailbreak, ModernPwner released an exploit named "cicuta_virosa" that worked up to 14.3. On the bottom of the README, he mentioned the following:
- [Discussion] Reminder: Use common sense and diligence when messing with your device.
-
iPhone 12 Pro
https://github.com/ModernPwner/cicuta_virosa In the PAC bypass section, they say,
- [Question] Should I update to iOS 14.5 for PAC bypass?
-
A note from our sponsor - InfluxDB
www.influxdata.com | 25 Apr 2024
Stats
ModernPwner/cicuta_virosa is an open source project licensed under GNU General Public License v3.0 only which is an OSI approved license.
The primary programming language of cicuta_virosa is C.
Sponsored