Main Page

Under New Ownership

Jailbreak Status
For older devices and versions, see Jailbreak.

{| style="width:100%"
 * style="width:50%; text-align:left; vertical-align:text-top;" |
 * style="width:50%; text-align:left; vertical-align:text-top;" |

Software

 * Apple Internal Apps
 * File formats
 * /|Filesystem
 * Firmware
 * Beta Firmware
 * Factory Firmware
 * OTA Updates
 * iTunes
 * iTunes Errors
 * iTunes Modes
 * MobileDevice Library
 * Keys
 * AES Keys
 * Apple Certificate
 * RSA Keys
 * TEA Keys
 * Firmware Keys
 * Decrypting Firmwares
 * GID Key
 * NCK
 * Protocols
 * Baseband Bootrom Protocol
 * DFU
 * Baseband Bootloader Protocol
 * Normal Mode
 * Recovery Mode
 * Restore Mode
 * System Log (syslog)

Jailbreak Software

 * Absinthe
 * blackra1n
 * Corona
 * evasi0n
 * evasi0n7
 * Geeksn0w
 * greenpois0n
 * JailbreakMe
 * limera1n
 * p0sixspwn
 * Pangu
 * Pangu8
 * PPJailbreak
 * purplera1n
 * PwnageTool
 * redsn0w
 * Rocky Racoon
 * Seas0nPass
 * sn0wbreeze
 * Spirit
 * TaiG
 * unthredera1n

Patches

 * Kernel
 * AMFI Binary Trust Cache Patch
 * PE i can has debugger Patch
 * Sandbox Patch
 * Vm map enter Patch
 * Vm map protect Patch
 * Ramdisk: ASR

Vulnerabilities and Exploits

 * 0x24000 Segment Overflow (24kpwn)
 * BPF STX Kernel Write Exploit
 * CVE-2013-0964
 * HFS Heap Overflow
 * HFS Legacy Volume Name Stack Buffer Overflow (feedface)
 * Incomplete Codesign Exploit
 * IOSurface Kernel Exploit
 * Limera1n Exploit
 * Malformed CFF Vulnerability
 * MobileBackup Copy Exploit
 * ndrv_setspec Integer Overflow
 * Packet Filter Kernel Exploit
 * Racoon String Format Overflow Exploit
 * SHA-1 Image Segment Overflow (SHAtter)
 * usb_control_msg(0x21, 2) Exploit
 * usb_control_msg(0xA1, 1) Exploit (steaks4uce)
 * Symbolic Link Vulnerability

Various Software

 * Cydia
 * EDA
 * iDroid
 * iFaith
 * iPhone Tracker
 * SemiRestore
 * SemiRestore7
 * TinyUmbrella
 * Sund0wn


 * style="width:50%; text-align:left; vertical-align:text-top;" |

Devices

 * iPhone
 * iPhone (m68ap)
 * iPhone 3G (n82ap)
 * iPhone 3GS (n88ap)
 * iPhone 4 (n90ap, n90bap, n92ap)
 * iPhone 4S (n94ap)
 * iPhone 5 (n41ap, n42ap)
 * iPhone 5c (n48ap, n49ap)
 * iPhone 5s (n51ap, n53ap)
 * iPhone 6 (n61ap)
 * iPhone 6 Plus (n56ap)
 * iPod touch
 * iPod touch (n45ap)
 * iPod touch 2G (n72ap)
 * iPod touch 3G (n18ap)
 * iPod touch 4G (n81ap)
 * iPod touch 5G (n78ap, n78aap)
 * iPod touch 6G (n102ap)
 * iPad
 * iPad (k48ap)
 * iPad 2 (k93ap, k94ap, k95ap, k93aap)
 * iPad 3 (j1ap, j2ap, j2aap)
 * iPad 4 (p101ap, p102ap, p103ap)
 * iPad Air (j71ap, j72ap, j73ap)
 * iPad Air 2 (j81ap, j82ap)
 * iPad mini
 * iPad mini 1G (p105ap, p106ap, p107ap)
 * iPad mini 2 (j85ap, j86ap, j87ap)
 * iPad mini 3 (j85map, j86map, j87map)
 * Apple TV
 * Apple TV 2G (k66ap)
 * Apple TV 3G (j33ap, j33iap)
 * Apple Watch
 * 38mm (n27aap)
 * 42mm (n28aap)

Application Processors

 * S5L8900 (iPhone, iPod touch, iPhone 3G)
 * S5L8720 (iPod touch 2G)
 * S5L8920 (iPhone 3GS)
 * S5L8922 (iPod touch 3G)
 * S5L8930 A4 (iPad, iPhone 4, iPod touch 4G, Apple TV 2G)
 * S5L8940 A5 (iPad 2, iPhone 4S)
 * S5L8942 A5 Rev A (Apple TV 3G, iPad 2 (iPad2,4), iPod touch 5G, iPad mini 1G)
 * S5L8945 A5X (iPad 3)
 * S5L8947 A5 Rev B (Apple TV 3G (AppleTV3,2))
 * S5L8950 A6 (iPhone 5, iPhone 5c)
 * S5L8955 A6X (iPad 4)
 * S5L8960 A7 (iPhone 5s, iPad mini 2, iPad mini 3)
 * S5L8965 A7 Variant (iPad Air)
 * T7000 A8 (iPhone 6, iPhone 6 Plus, iPod touch 6G)
 * T7001 A8X (iPad Air 2)
 * S1 (Apple Watch)

Baseband Devices

 * PMB8876 or S-Gold 2 (iPhone)
 * PMB8878 or X-Gold 608 (iPhone 3G, iPhone 3GS, iPad (3G Variant))
 * XMM6180 or X-Gold 618 (iPhone 4 (iPhone3,1 and iPhone3,2), iPad 2 (iPad2,2))
 * MDM6600 (iPhone 4 (iPhone3,3), iPad 2 (iPad2,3))
 * MDM6610 (iPhone 4S)
 * MDM9600 (iPad 3)
 * MDM9615 (iPhone 5, iPad 4, iPad mini 1G, iPhone 5c, iPhone 5s, iPad Air, iPad mini 2)
 * MDM9625 (iPhone 6, iPhone 6 Plus, and iPad Air 2)

Motion Coprocessors

 * LPC18A1 M7 (iPhone 5s, iPad Air, iPad mini 2, iPad mini 3)
 * LPC18B1‎ M8 (iPhone 6, iPhone 6 Plus, iPad Air 2, iPod touch 6G)

WLAN/Bluetooth

 * Marvell 88x8686
 * BlueCore 4
 * BlueCore 6
 * BCM4325
 * BCM4329
 * BCM4330
 * BCM4334

NFC

 * NXP PN548

Compass

 * AKM8973
 * AKM8975
 * AK8963

Other

 * Accelerometer
 * Gyroscope: AGD1 2022 FP6AQ
 * Connectors: 30-pin, Lightning
 * }

{| style="width:100%"
 * style="width:50%; text-align:left; vertical-align:text-top;" |
 * style="width:50%; text-align:left; vertical-align:text-top;" |

iPhone Hackers

 * chpwn
 * comex
 * geohot
 * iH8sn0w
 * MuscleNerd
 * pimskeks
 * planetbeing
 * pod2g
 * posixninja
 * saurik
 * winocm

iPhone Hacker Teams

 * Chronic Dev
 * iPhone Dev Team
 * Dream Team
 * evad3rs

Application Development

 * Apple Certification Process
 * Bypassing iPhone Code Signatures
 * Distribution Methods
 * Frameworks
 * Misuse of developer certificates
 * MobileDevice Library
 * Mobile Substrate
 * Toolchain (Includes tutorials)
 * Toolchain 2.0 (Includes tutorials)
 * iPhoneDevWiki

Application Copy Protection

 * Application Structure and Signatures
 * Bugging Debuggers
 * Copy Protection Overview
 * Defeating Cracks
 * Mach-O Loading Process


 * style="width:50%; text-align:left; vertical-align:text-top;" |

Guides

 * Tutorials
 * Useful Links

Definitions

 * Activation and Hacktivation
 * ASLR
 * Baseband
 * Bootloader
 * Bootchain
 * Bootrom / VROM
 * Bricked
 * CHIPID
 * DFU Mode
 * Failbreak
 * iBEC
 * iBoot
 * iBSS
 * IMG3 tags
 * BORD
 * CERT
 * CHIP
 * CPID
 * DATA
 * ECID
 * KBAG
 * PROD
 * SDOM
 * SEPO
 * SHSH
 * TYPE
 * VERS
 * Jailbreak
 * Tethered jailbreak
 * Untethered jailbreak
 * Firmware downgrading
 * Tethered Downgrade
 * Kernel
 * launchd
 * LLB
 * NAND
 * NOR
 * NORID
 * Unlock
 * Userland
 * }