Skip to content

Instantly share code, notes, and snippets.

@ninjaprawn
ninjaprawn / record.xm
Created October 24, 2015 20:53
random attempt to record screen
%hook BSPlatform
- (BOOL)isInternalInstall {
return YES;
}
%end
@ninjaprawn
ninjaprawn / yeah2.xm
Last active October 14, 2015 08:52
3D Touch Menu logos/objc
@interface SBApplicationController
+(id)sharedInstance;
-(id)applicationWithBundleIdentifier:(id)arg1 ;
@end
@interface SBApplication
@end
@interface SBApplicationIcon : NSObject
-(id)initWithApplication:(id)arg1 ;
@ninjaprawn
ninjaprawn / yeah
Created October 14, 2015 08:10
3D Touch Menu cycript
var app = [SBApplicationController sharedInstance];
var ap = [app applicationWithBundleIdentifier:@"com.apple.camera"];
var appicon = [[SBApplicationIcon alloc] initWithApplication:ap];
var iconView = [[SBIconViewMap homescreenMap] mappedIconViewForIcon:appicon];
[[SBIconController sharedInstance] _revealMenuForIconView:iconView presentImmediately:true];
@ninjaprawn
ninjaprawn / terriblegeorge.md
Last active October 9, 2015 08:33
My terrible attempt at trying to find exploits for iOS

INTRO

Yeah, just want to mess around. Mainly trying to use bugs/vulns revealed by apple in ios patches (e.g. CVE-2012-3726 from https://support.apple.com/en-au/HT202615) Using my iPod 4, downgraded to ios 4.

BUT FIRST

Need to know how the exploit stuff works, and how to find them w/o using existing, patched vulns. Main type: buffer overflow. Data usually has a fixed memory size in which it is allocated (only that variable can currently use that space). Buffer overflow is when there are more bytes than the allocated space, causing memory to overflow into other memory.

@ninjaprawn
ninjaprawn / keybase.md
Created April 14, 2015 08:41
keybase.md

Keybase proof

I hereby claim:

  • I am ninjaprawn on github.
  • I am ninjaprawn (https://keybase.io/ninjaprawn) on keybase.
  • I have a public key whose fingerprint is CF49 8FBE 0A08 CD6B CD78 E984 B80D B856 F2F3 EA71

To claim this, I am signing this object: