shadow
shadow copied to clipboard
A jailbreak detection bypass for modern iOS jailbreaks.
Sources: - https://github.com/vtky/ios-antidebugging/blob/master/antidebugging/main.m#L27 - https://github.com/PojavLauncherTeam/PojavLauncher_iOS/blob/a100785d68fdef2edb36b6439908ac2dde57796c/Natives/utils.m#L31C6-L31C6 I have successfully bypassed most of the anti-debugging checks mentioned in the provided sources while running in the Xcode debugger and under LLDB. However, I...
I'm doing some research and know that the target software checks for the existence of certain paths to tell if the device is jailbroken. But none of these paths are...
**Describe the bug** After installing palera1n on my ipad mini 4 (running ios15.7.6) I tried installing shadow and since then have not been able to uninstal or install it or...
First of all, great work. There really aren’t that much working bypasses for iOS 14+ and Shadow is the best in my opinion. Sadly it still doesn’t bypass some of...
due to my stupidity, I had to update from 15.4.1 to 16.3.1, sigh.... **Describe the bug** shadow doesn't work at all with ellekit (rootless) on palera1n iOS 16.3.1, with fishhook,...
IOSSecuritySuite bypass
these functions are also used to detect jailbroken environment or hooking _NSGetEnviron backtrace backtrace_symbols mach_syscall (svc)
**Describe your idea. Include drawings or screenshots if necessary.** [...]
Exploits a small weakness in implementation. Will need to improve class detection filtering.
In order to counter MSHookFunction and fishhook, many apps have started to use the detection method based on the assembly instruction ```SVC #0x80```. Are there any plans to block this...