Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Patching binaries itself #9

Open
joeyoropesa-dev opened this issue Aug 12, 2023 · 0 comments
Open

Patching binaries itself #9

joeyoropesa-dev opened this issue Aug 12, 2023 · 0 comments

Comments

@joeyoropesa-dev
Copy link

What about creating a way for patching binary files itself so that with using Misaka package manager that works thanks to the Mac Cow Dirty bug with TrollStore, it can give a full support for running modified read-only binaries from the location of the tweak inside that app it can injects to the original binary patch with the same permissions execution just like original file.

In that way basically, AppSync Unified tweak (dylib patches) can be used to patch original installd file that is taken (copied) from the user's/dev's device into Misaka tweak directory and to sign the binary using TrollStore bug ldid command and to just turn on the Misaka tweak to apply changes to the file, respring the device, allow the tweak to run in the background and done.

Now non-jailbroken iDevices that is vulnable to those 2 bugs and exploits it can peacefully enjoy in installing normally any unsigned app for jailbreak and run it without getting stopped by amfi because everything is bypassed thanks to the tweak and it will lasts forever even after reboot without any PC

In that way, AppSync Unified Untethered is born!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant