
To build and run the iOS Jailbreak, all you have to do is run the ios_install.py script and follow the instructions.
Fugu jailbreak install#
You need to have iproxy and ideviceinstaller installed (brew install usbmuxd ideviceinstaller).You need the IPSW for your device, unzipped.You need a supported device running a supported iOS version (see above).Developers: PLEASE TEST ANY CHANGES YOU MAKE TO THE UNTETHER ON A VIRTUAL DEVICE FIRST.Additionally, the fast untether (in case it actually works) is more UNSAFE than the "slow" untether.The fast untether (disabled unless you edit the source code) HAS NOT BEEN TESTED ON A REAL DEVICE - DO NOT USE IT.Messing around with the untether may BOOTLOOP your device.(Jailbreak Developers: You can make your jailbreak untethered just by creating a CLI version that supports libkrw, copying it to /.Fugu14Untether/autorun/ and writing a trust cache to /.Fugu14Untether/trustcaches/).Supports Siguza's libkrw library (load /usr/lib/libkrw/libFugu14Krw.dylib and call krw_initializer).Executables put in /.Fugu14Untether/autorun/ will be launched during boot (make sure to also create a trust cache for your executable!).Trustcaches put in /.Fugu14Untether/trustcaches/ will be loaded automatically.A simple TCP shell is available on port 1337.


The kernel exploit is extremely reliable (it will never trigger a kernel panic).
Fugu jailbreak code#
Note that all of this code was written specifically for arm64e, so some changes are required to add arm64 support to the untether.

However, it is in theory possible to install the untether on them (e.g. Support for lower versions (down to 14.2) can be added by editing arm/shared/ClosurePwn/Sources/ClosurePwn/PwnClosure.swift and arm/shared/KernelExploit/Sources/KernelExploit/offsets.swift.Īrm64 devices are not supported because the exploit to install the Fugu14 App does not work on these devices. Supported Devices/iOS Versionsįugu14 should support all arm64e devices (iPhone XS and newer) on iOS 14.3 - 14.5.1. Fugu14 is an (incomplete) iOS 14 Jailbreak, including an untether (persistence), kernel exploit, kernel PAC bypass and PPL bypass.
