Main Page

Jailbreak Status
{| class="wikitable" style="font-size:1em; width:100%;" ! style="height:3em;" | Device ! Apple Watch (1st generation) and newer ! Apple TV (4th generation) ! iPad (4th generation) and newer ! iPad mini 2 and newer ! iPhone 5 and newer ! iPod touch (6th generation) ! style="height:3em;" | Latest public firmware ! style="height:3em;" | Jailbreak available? For older devices and versions, see Jailbreak.
 * 3.2.3 (14V753)
 * 10.2.2 (14W756)
 * colspan="4" | 10.3.3 (14G60)
 * colspan="10" No

{| style="width:100%"
 * style="width:50%; text-align:left; vertical-align:text-top;" |
 * style="width:50%; text-align:left; vertical-align:text-top;" |

Software

 * Apple Internal Apps
 * File formats
 * /|Filesystem
 * Firmware
 * Beta Firmware
 * Factory Firmware
 * OTA Updates
 * iTunes
 * iTunes Errors
 * iTunes Modes
 * MobileDevice Library
 * Keys
 * AES Keys
 * Apple Certificate
 * RSA Keys
 * TEA Keys
 * Firmware Keys
 * Decrypting Firmwares
 * GID Key
 * NCK
 * Protocols
 * Baseband Bootrom Protocol
 * DFU
 * Baseband Bootloader Protocol
 * Normal Mode
 * Recovery Mode
 * Restore Mode
 * System Log (syslog)

Jailbreak Software

 * Absinthe
 * blackra1n
 * Corona
 * evasi0n
 * evasi0n7
 * Geeksn0w
 * greenpois0n
 * Home Depot
 * ipwndfu
 * JailbreakMe
 * LiberTV
 * limera1n
 * p0sixspwn
 * Pangu
 * Pangu8
 * Pangu9
 * Phœnix
 * PPJailbreak
 * purplera1n
 * PwnageTool
 * redsn0w
 * Rocky Racoon
 * Seas0nPass
 * sn0wbreeze
 * Spirit
 * TaiG
 * unthredera1n
 * yalu

Patches

 * Kernel
 * AMFI Binary Trust Cache Patch
 * PE i can has debugger Patch
 * Sandbox Patch
 * Vm map enter Patch
 * Vm map protect Patch
 * Ramdisk: ASR

Vulnerabilities and Exploits

 * 0x24000 Segment Overflow (24kpwn)
 * alloc8 Exploit
 * BPF STX Kernel Write Exploit
 * CVE-2013-0964
 * HFS Heap Overflow
 * HFS Legacy Volume Name Stack Buffer Overflow (feedface)
 * Incomplete Codesign Exploit
 * IOSurface Kernel Exploit
 * Limera1n Exploit
 * Malformed CFF Vulnerability
 * MobileBackup Copy Exploit
 * ndrv_setspec Integer Overflow
 * Packet Filter Kernel Exploit
 * Racoon String Format Overflow Exploit
 * SHA-1 Image Segment Overflow (SHAtter)
 * usb_control_msg(0x21, 2) Exploit
 * usb_control_msg(0xA1, 1) Exploit (steaks4uce)
 * Symbolic Link Vulnerability

Various Software

 * Cydia
 * Cydia Impactor
 * EDA
 * iFaith
 * SemiRestore7
 * SemiRestore8
 * SemiRestore9
 * Sund0wn
 * TinyUmbrella

Bad stuff

 * Malware for iOS
 * Misuse of enterprise and developer certificates
 * Scam Jailbreaks and Unlocks


 * style="width:50%; text-align:left; vertical-align:text-top;" |

Devices

 * AirPods
 * AirPods (B188AP)
 * Apple TV
 * Apple TV (2nd generation) (K66AP)
 * Apple TV (3rd generation) (J33AP, J33IAP)
 * Apple TV (4th generation) (J42dAP)
 * Apple TV 4K (J105aAP)
 * Apple Watch
 * Apple Watch (1st generation) (N27aAP, N28aAP)
 * Apple Watch Series 1 (N27dAP, N28dAP)
 * Apple Watch Series 2 (N74AP, N75AP)
 * Apple Watch Series 3 (N111sAP, N111bAP, N121sAP, N121bAP)
 * HomePod
 * HomePod (B238aAP)
 * iPad
 * iPad (K48AP)
 * iPad 2 (K93AP, K94AP, K95AP, K93AAP)
 * iPad (3rd generation) (J1AP, J2AP, J2AAP)
 * iPad (4th generation) (P101AP, P102AP, P103AP)
 * iPad Air (J71AP, J72AP, J73AP)
 * iPad Air 2 (J81AP, J82AP)
 * iPad Pro (12.9-inch) (J98aAP, J99aAP)
 * iPad Pro (9.7-inch) (J127AP, J128AP)
 * iPad (5th generation) (J71sAP, J71tAP, J72sAP, J72tAP)
 * iPad Pro (12.9-inch, 2nd generation) (J120AP, J121AP)
 * iPad Pro (10.5-inch) (J207AP, J208AP)
 * iPad mini
 * iPad mini (P105AP, P106AP, P107AP)
 * iPad mini 2 (J85AP, J86AP, J87AP)
 * iPad mini 3 (J85mAP, J86mAP, J87mAP)
 * iPad mini 4 (J96AP, J97AP)
 * iPhone
 * iPhone (M68AP)
 * iPhone 3G (N82AP)
 * iPhone 3GS (N88AP)
 * iPhone 4 (N90AP, N90BAP, N92AP)
 * iPhone 4S (N94AP)
 * iPhone 5 (N41AP, N42AP)
 * iPhone 5c (N48AP, N49AP)
 * iPhone 5s (N51AP, N53AP)
 * iPhone 6 (N61AP)
 * iPhone 6 Plus (N56AP)
 * iPhone 6s (N71AP, N71mAP)
 * iPhone 6s Plus (N66AP, N66mAP)
 * iPhone SE (N69AP, N69uAP)
 * iPhone 7 (D10AP, D101AP)
 * iPhone 7 Plus (D11AP, D111AP)
 * iPhone 8 (D20AP, D201AP)
 * iPhone 8 Plus (D21AP, D211AP)
 * iPhone X (D22AP, D221AP)
 * iPod touch
 * iPod touch (N45AP)
 * iPod touch (2nd generation) (N72AP)
 * iPod touch (3rd generation) (N18AP)
 * iPod touch (4th generation) (N81AP)
 * iPod touch (5th generation) (N78AP, N78aAP)
 * iPod touch (6th generation) (N102AP)

Application Processors

 * S5L8900 (iPhone, iPod touch, iPhone 3G)
 * S5L8720 (iPod touch (2nd generation))
 * S5L8920 (iPhone 3GS)
 * S5L8922 (iPod touch (3rd generation))
 * S5L8930 A4 (iPad, iPhone 4, iPod touch (4th generation), Apple TV (2nd generation))
 * S5L8940 A5 (iPad 2 (iPad2,1), iPad 2 (iPad2,2), iPad 2 (iPad2,3), iPhone 4S)
 * S5L8942 A5 Rev A (Apple TV (3rd generation) (AppleTV3,1), iPad 2 (iPad2,4), iPod touch (5th generation), iPad mini)
 * S5L8945 A5X (iPad (3rd generation))
 * S5L8947 A5 Rev B (Apple TV (3rd generation) (AppleTV3,2))
 * S5L8950 A6 (iPhone 5, iPhone 5c)
 * S5L8955 A6X (iPad (4th generation))
 * S5L8960 A7 (iPhone 5s, iPad mini 2, iPad mini 3)
 * S5L8965 A7 Variant (iPad Air)
 * T7000 A8 (Apple TV (4th generation), HomePod, iPad mini 4, iPhone 6, iPhone 6 Plus, iPod touch (6th generation))
 * T7001 A8X (iPad Air 2)
 * S7002 S1 (Apple Watch (1st generation))
 * T8002 S1P (Apple Watch Series 1), S2 (Apple Watch Series 2)
 * S8000 A9 (Samsung) (iPad (5th generation), iPhone 6s, iPhone 6s Plus, iPhone SE)
 * S8001 A9X (iPad Pro (12.9-inch) and iPad Pro (9.7-inch))
 * S8003 A9 (TSMC) (iPad (5th generation), iPhone 6s, iPhone 6s Plus, iPhone SE)
 * T8010 A10 (iPhone 7, iPhone 7 Plus)
 * W1 (AirPods, Beats Solo3, Beats Studio3, BeatsX, PowerBeats3)
 * T8011 A10X (iPad Pro (12.9-inch, 2nd generation), iPad Pro (10.5-inch), Apple TV 4K)
 * W2 (Apple Watch Series 3)
 * S3 (Apple Watch Series 3)
 * T8015 A11 (iPhone 8, iPhone 8 Plus, iPhone X)

Baseband Devices

 * PMB8876 S-Gold 2 (iPhone)
 * PMB8878 X-Gold 608 (iPhone 3G, iPhone 3GS, iPad (3G model))
 * XMM6180 X-Gold 618 (iPhone 4 (iPhone3,1, iPhone3,2), iPad 2 (iPad2,2))
 * MDM6600 (iPhone 4 (iPhone3,3), iPad 2 (iPad2,3))
 * MDM6610 (iPhone 4S)
 * MDM9600 (iPad (3rd generation))
 * MDM9615 (iPad (4th generation), iPad Air, iPad mini, iPad mini 2, iPad mini 3, iPhone 5, iPhone 5c, iPhone 5s)
 * MDM9625 (iPad Air 2, iPad Pro (12.9-inch), iPad (5th generation), iPad mini 4, iPhone 6, iPhone 6 Plus, iPhone SE)
 * MDM9635 (iPad Pro (9.7-inch), iPhone 6s, iPhone 6s Plus)
 * MDM9645 (iPad Pro (12.9-inch, 2nd generation), iPad Pro (10.5-inch), iPhone 7, iPhone 7 Plus)
 * PMB9943 X-Gold 736 (iPhone 7, iPhone 7 Plus)
 * }

{| style="width:100%"
 * style="width:50%; text-align:left; vertical-align:text-top;" |
 * style="width:50%; text-align:left; vertical-align:text-top;" |

iPhone Hackers

 * axi0mX
 * chpwn
 * comex
 * geohot
 * iH8sn0w
 * MuscleNerd
 * pimskeks
 * planetbeing
 * pod2g
 * posixninja
 * qwertyoruiop
 * saurik
 * winocm

iPhone Hacker Teams

 * Chronic Dev
 * iPhone Dev Team
 * Dream Team
 * evad3rs

Application Development

 * Bypassing iPhone Code Signatures
 * Frameworks
 * Misuse of developer certificates
 * MobileDevice Library
 * Mobile Substrate
 * Toolchain (Includes tutorials)
 * Toolchain 2.0 (Includes tutorials)
 * iPhoneDevWiki

Application Copy Protection

 * Bugging Debuggers
 * Copy Protection Overview


 * style="width:50%; text-align:left; vertical-align:text-top;" |

Guides

 * Tutorials
 * Useful Links

Definitions

 * Activation and Hacktivation
 * ASLR
 * Baseband
 * Bootloader
 * Bootchain
 * Bootrom / VROM
 * Bricked
 * CHIPID
 * DFU Mode
 * Failbreak
 * iBoot
 * IMG3 tags
 * BORD
 * CERT
 * CHIP
 * ECID
 * KBAG
 * PROD
 * SDOM
 * SEPO
 * SHSH
 * TYPE
 * VERS
 * Jailbreak
 * Tethered jailbreak
 * Untethered jailbreak
 * Firmware downgrading
 * Tethered Downgrade
 * Kernel
 * launchd
 * LLB
 * NAND
 * Unlock
 * Userland
 * }