Firmware Status
Product Line | Apple TV | HomePod | Apple Watch | iPad | iPad Air | iPad Pro | iPad mini | iPhone | ||
---|---|---|---|---|---|---|---|---|---|---|
Supported | Apple TV HD and later |
All models[1] | Series 4 and later |
Series 9 and later |
6th generation and later |
3rd generation and later |
12.9-inch (2nd generation), 11-inch (1st generation), 10.5-inch and later |
5th generation and later |
iPhone XR and later | |
Latest Public Firmwares |
17.0 (21J354) |
10.0.1 (21R360) |
10.0.2 (21R371) |
17.0.3 (21A360) | ||||||
Latest Beta Firmwares |
17.1 beta 2 (21K5054e) |
10.1 beta 2 (21S5053f) |
17.1 beta 2 (21B5056e) |
- ^ Excluding AudioAccessory1,2
See Jailbreak for a complete list of all devices, firmware versions and tools used to jailbreak those versions.
macOS Status
Product Line | iMac | iMac Pro | MacBook Air | MacBook Pro | Mac Pro | Mac Studio | Mac mini | |
---|---|---|---|---|---|---|---|---|
Supported | 2019 and later | 2017 | 2018 and later | 2018 and later | 2019 and later | 2022 and later | 2018 and later | |
Latest Public Release |
Sonoma 14.0 (23A344) | |||||||
Latest Beta Release |
14.1 beta 2 (23B5056e) |
Software
Jailbreak Software

- Absinthe
- Ac1dSn0w
- AppSnapp
- AppTapp Installer
- backr00m
- bakera1n
- Blackb0x
- blackra1n
- Blizzard
- checkra1n
- Cheyote
- Chimera
- cinject
- Corona
- daibutsu
- Deca5
- Dopamine
- doubleH3lix
- Electra
- Elevat0r
- EtasonATV
- EtasonJB
- evasi0n
- evasi0n7
- Fugu
- Fugu14
- Fugu15
- g0blin
- g1lbertJB
- Geeksn0w
- greeng0blin
- greenpois0n (jailbreak)
- h3lix
- Home Depot
- iBooty
- iBrickr
- iLiberty+
- iPhoneInterface
- ipwndfu
- Jailbreak Monte
- JailbreakMe
- JailbreakMe 4.0
- jbme
- kok3shi9
- kok3shiX
- LiberTV
- LiberiOS
- limera1n
- Meridian
- mineekJB
Vulnerabilities and Exploits

- 0x24000 Segment Overflow
- ARM Exception Vector Info Leak
- ARM7 Go
- alloc8 Exploit
- amfid Lazy Binding Exploit
- amfid Text Relocation Exploit
- BPF_STX Kernel Write Exploit
- blackbird Exploit
- CVE-2013-0964
- CVE-2021-30773
- CVE-2021-30807
- CVE-2021-30883
- checkm8 Exploit
- CoreTrust Root Certificate Validation Vulnerability
- De Rebus Antiquis
- diags (iBoot command)
- Dual Boot Exploit
- Dynamic memmove() locating
- HFS Heap Overflow
- HFS Legacy Volume Name Stack Buffer Overflow
- iOS 5 HFS Heap Buffer Overflow
- IOSurface Kernel Exploit
- IOUSBDeviceFamily Vulnerability
- Incomplete Codesign Exploit
- iran
- Kernel memory write via ROP gadget
- libTiff Exploit
- limera1n Exploit
- MacDirtyCow
- Malformed CFF Vulnerability
- Malformed PairRequest
- MobileBackup Copy Exploit
- Overlapping Segment Attack
- Packet Filter Kernel Exploit
- posix_spawn kernel information leak
- Psychic Paper
- Pwnage
- Pwnage 2.0
- Racoon String Format Overflow Exploit
- Ramdisk Hack
- SHA-1 Image Segment Overflow
- Shebang Trick
- Symbolic Link Vulnerability
- T1 Font Integer Overflow
- Timezone Vulnerability
- usb_control_msg(0x21, 2) Exploit
- usb_control_msg(0xA1, 1) Exploit
- v0rtex
- vm_map_copy_t corruption for arbitrary memory disclosure
Patches
Various Software
Bad stuff
Apple Software

- Apple Internal Apps
- File formats
- Filesystem
- Services
- Firmware ()
- iTunes ()
- Keys ()
- OTA Updates ()
- Protocols ()
- System Log (syslog)
Operating Systems
Hardware

Processors
Devices
Mac
Application Processors
Development

iPhone Hacker Teams
Application Development
- Bypassing iPhone Code Signatures
- Frameworks
- MobileDevice Library
- Cydia Substrate
- Toolchain (Includes tutorials)
- Toolchain 2.0 (Includes tutorials)