Main Page

Jailbreak Status
{| class="wikitable" style="font-size:1em; width:100%;" ! style="height:3em;" | Device ! Apple Watch ! Apple TV 3G ! Apple TV 4G ! iPad 2 and up ! iPad mini and up ! iPhone 4S and up ! iPod touch 5G and up ! style="height:3em;" | Latest firmware ! style="height:3em;" | Jailbreak available? For older devices and versions, see Jailbreak.
 * 2.1/9.0 (13S661)
 * 7.2.1/8.4.1 (12H523)
 * 9.1.1 (13U717)
 * colspan="3" | 9.2.1 (13D15) and (13D20)
 * 9.2.1 (13D15)
 * colspan="8" No

{| style="width:100%"
 * style="width:50%; text-align:left; vertical-align:text-top;" |
 * style="width:50%; text-align:left; vertical-align:text-top;" |

Software

 * Apple Internal Apps
 * File formats
 * /|Filesystem
 * Firmware
 * Beta Firmware
 * Factory Firmware
 * OTA Updates
 * iTunes
 * iTunes Errors
 * iTunes Modes
 * MobileDevice Library
 * Keys
 * AES Keys
 * Apple Certificate
 * RSA Keys
 * TEA Keys
 * Firmware Keys
 * Decrypting Firmwares
 * GID Key
 * NCK
 * Protocols
 * Baseband Bootrom Protocol
 * DFU
 * Baseband Bootloader Protocol
 * Normal Mode
 * Recovery Mode
 * Restore Mode
 * System Log (syslog)

Jailbreak Software

 * Absinthe
 * blackra1n
 * Corona
 * evasi0n
 * evasi0n7
 * Geeksn0w
 * greenpois0n
 * JailbreakMe
 * limera1n
 * p0sixspwn
 * Pangu
 * Pangu8
 * Pangu9
 * PPJailbreak
 * purplera1n
 * PwnageTool
 * redsn0w
 * Rocky Racoon
 * Seas0nPass
 * sn0wbreeze
 * Spirit
 * TaiG
 * unthredera1n

Patches

 * Kernel
 * AMFI Binary Trust Cache Patch
 * PE i can has debugger Patch
 * Sandbox Patch
 * Vm map enter Patch
 * Vm map protect Patch
 * Ramdisk: ASR

Vulnerabilities and Exploits

 * 0x24000 Segment Overflow (24kpwn)
 * BPF STX Kernel Write Exploit
 * CVE-2013-0964
 * HFS Heap Overflow
 * HFS Legacy Volume Name Stack Buffer Overflow (feedface)
 * Incomplete Codesign Exploit
 * IOSurface Kernel Exploit
 * Limera1n Exploit
 * Malformed CFF Vulnerability
 * MobileBackup Copy Exploit
 * ndrv_setspec Integer Overflow
 * Packet Filter Kernel Exploit
 * Racoon String Format Overflow Exploit
 * SHA-1 Image Segment Overflow (SHAtter)
 * usb_control_msg(0x21, 2) Exploit
 * usb_control_msg(0xA1, 1) Exploit (steaks4uce)
 * Symbolic Link Vulnerability

Various Software

 * Cydia
 * EDA
 * iFaith
 * SemiRestore7
 * SemiRestore8
 * Sund0wn
 * TinyUmbrella

Bad stuff

 * Malware for iOS
 * Misuse of enterprise and developer certificates
 * Scam Jailbreaks and Unlocks


 * style="width:50%; text-align:left; vertical-align:text-top;" |

Devices

 * Apple TV
 * Apple TV 2G (K66AP)
 * Apple TV 3G (J33AP, J33IAP)
 * Apple TV 4G (J42dAP)
 * Apple Watch
 * 38 mm (N27aAP)
 * 42 mm (N28aAP)
 * iPad
 * iPad (K48AP)
 * iPad 2 (K93AP, K94AP, K95AP, K93AAP)
 * iPad 3 (J1AP, J2AP, J2AAP)
 * iPad 4 (P101AP, P102AP, P103AP)
 * iPad Air (J71AP, J72AP, J73AP)
 * iPad Air 2 (J81AP, J82AP)
 * iPad Pro (J98aAP, J99aAP)
 * iPad mini
 * iPad mini (P105AP, P106AP, P107AP)
 * iPad mini 2 (J85AP, J86AP, J87AP)
 * iPad mini 3 (J85mAP, J86mAP, J87mAP)
 * iPad mini 4 (J96AP, J97AP)
 * iPhone
 * iPhone (M68AP)
 * iPhone 3G (N82AP)
 * iPhone 3GS (N88AP)
 * iPhone 4 (N90AP, N90BAP, N92AP)
 * iPhone 4S (N94AP)
 * iPhone 5 (N41AP, N42AP)
 * iPhone 5c (N48AP, N49AP)
 * iPhone 5s (N51AP, N53AP)
 * iPhone 6 (N61AP)
 * iPhone 6 Plus (N56AP)
 * iPhone 6s (N71AP, N71mAP)
 * iPhone 6s Plus (N66AP, N66mAP)
 * iPod touch
 * iPod touch (N45AP)
 * iPod touch 2G (N72AP)
 * iPod touch 3G (N18AP)
 * iPod touch 4G (N81AP)
 * iPod touch 5G (N78AP, N78aAP)
 * iPod touch 6G (N102AP)

Application Processors

 * S5L8900 (iPhone, iPod touch, iPhone 3G)
 * S5L8720 (iPod touch 2G)
 * S5L8920 (iPhone 3GS)
 * S5L8922 (iPod touch 3G)
 * S5L8930 A4 (iPad, iPhone 4, iPod touch 4G, Apple TV 2G)
 * S5L8940 A5 (iPad 2 (iPad2,1), iPad 2 (iPad2,2), iPad 2 (iPad2,3), iPhone 4S)
 * S5L8942 A5 Rev A (Apple TV 3G, iPad 2 (iPad2,4), iPod touch 5G, iPad mini)
 * S5L8945 A5X (iPad 3)
 * S5L8947 A5 Rev B (Apple TV 3G (AppleTV3,2))
 * S5L8950 A6 (iPhone 5, iPhone 5c)
 * S5L8955 A6X (iPad 4)
 * S5L8960 A7 (iPhone 5s, iPad mini 2, iPad mini 3)
 * S5L8965 A7 Variant (iPad Air)
 * T7000 A8 (Apple TV 4G, iPad mini 4, iPhone 6, iPhone 6 Plus, iPod touch 6G)
 * T7001 A8X (iPad Air 2)
 * S7002 S1 (Apple Watch)
 * S8000 A9 (Samsung) (iPhone 6s, iPhone 6s Plus)
 * S8001 A9X (iPad Pro)
 * S8003 A9 (TSMC) (iPhone 6s, iPhone 6s Plus)

Baseband Devices

 * PMB8876 or S-Gold 2 (iPhone)
 * PMB8878 or X-Gold 608 (iPhone 3G, iPhone 3GS and iPad (3G Variant))
 * XMM6180 or X-Gold 618 (iPhone 4 (iPhone3,1, iPhone3,2) and iPad 2 (iPad2,2))
 * MDM6600 (iPhone 4 (iPhone3,3) and iPad 2 (iPad2,3))
 * MDM6610 (iPhone 4S)
 * MDM9600 (iPad 3)
 * MDM9615 (iPad 4, iPad Air, iPad mini, iPad mini 2, iPad mini 3, iPhone 5, iPhone 5c and iPhone 5s)
 * MDM9625 (iPad Air 2, iPad Pro, iPad mini 4, iPhone 6 and iPhone 6 Plus)
 * MDM9635 (iPhone 6s and iPhone 6s Plus)
 * }

{| style="width:100%"
 * style="width:50%; text-align:left; vertical-align:text-top;" |
 * style="width:50%; text-align:left; vertical-align:text-top;" |

iPhone Hackers

 * chpwn
 * comex
 * geohot
 * iH8sn0w
 * MuscleNerd
 * pimskeks
 * planetbeing
 * pod2g
 * posixninja
 * saurik
 * winocm

iPhone Hacker Teams

 * Chronic Dev
 * iPhone Dev Team
 * Dream Team
 * evad3rs

Application Development

 * Bypassing iPhone Code Signatures
 * Frameworks
 * Misuse of developer certificates
 * MobileDevice Library
 * Mobile Substrate
 * Toolchain (Includes tutorials)
 * Toolchain 2.0 (Includes tutorials)
 * iPhoneDevWiki

Application Copy Protection

 * Bugging Debuggers
 * Copy Protection Overview


 * style="width:50%; text-align:left; vertical-align:text-top;" |

Guides

 * Tutorials
 * Useful Links

Definitions

 * Activation and Hacktivation
 * ASLR
 * Baseband
 * Bootloader
 * Bootchain
 * Bootrom / VROM
 * Bricked
 * CHIPID
 * DFU Mode
 * Failbreak
 * iBoot
 * IMG3 tags
 * BORD
 * CERT
 * CHIP
 * CPID
 * ECID
 * KBAG
 * PROD
 * SDOM
 * SEPO
 * SHSH
 * TYPE
 * VERS
 * Jailbreak
 * Tethered jailbreak
 * Untethered jailbreak
 * Firmware downgrading
 * Tethered Downgrade
 * Kernel
 * launchd
 * LLB
 * NAND
 * Unlock
 * Userland
 * }