The Misaka package manager app for MacDirtyCow exploit-susceptible devices running iOS or iPadOS 15.0-16.1.2 received yet another update this week, this time bringing it up to version 1.8.9 beta.
App developers can make special sideloadable apps that take advantage of the MacDirtyCow bug on iOS & iPadOS 15.0-15.7 and 16.0-16.1.2. Apps that exploit this bug can make cosmetic and functional changes to the operating system if it’s within the bounds of memory that a sandboxed app can access.
Follow along as we provide ongoing coverage on the latest MacDirtyCow developments.
The Misaka package manager app for MacDirtyCow exploit-susceptible devices running iOS or iPadOS 15.0-16.1.2 received yet another update this week, this time bringing it up to version 1.8.9 beta.
Looking for MacDirtyCow add-ons for your iOS or iPadOS 15.0-16.1.2 device that will let you customize your handset outside of the stock parameters? If so, then you might take an interest in one called NoVulnTools2 by iOS developer tyler1029.
System sounds aren’t readily configurable on non-jailbroken iPhones and iPads, except maybe the ringtone and text tone, but with a MacDirtyCow exploit-based add-on called SoundManager by iOS developer EPOS, you can do this even without a jailbreak.
The Misaka package manager app for MacDirtyCow-vulnerable devices running iOS & iPadOS 15.0-16.1.2 was updated late Tuesday night to version 1.8.8 beta, bringing with it another small handful of improvements for end users.
How would you like it if your iPhone’s Settings app icons took the appearance of a Samsung Android device? Even better… what if you could do that without jailbreaking? Interested yet?
The Settings app is the primary place where iPhone users can change device behavior and options, but depending on your tastes, you might find the organization to be less than optimal.
Just last week, we showed you a package manager app for MacDirtyCow exploit-susceptible devices called Misakathat could be used to install add-ons for customizing the iOS user interface, and we walked you through the process to install and use it.
Anyone that has a Face ID-equipped iPhone and runs a MacDirtyCow-susceptible firmware between iOS 15.0-16.1.2 can take advantage of a checkra1n-inspired Face ID glyph animation that replaces the traditional animated Face ID padlock when authenticating themselves.
Whether you’re jailbroken or not, if you have a firmware supporting the MacDirtyCow exploit, namely iOS or iPadOS 15.0-16.1.2, then you can take advantage of add-ons that modify the appearance and behavior of your iPhone or iPad.
If you’ve got a device running MacDirtyCow-vulnerable firmware, such as iOS or iPadOS 15.0-16.1.2, then you might be excited to learn of a Control Center add-on called Plampy UI Control Center by iOS developer YangJiii.
Much like you can install package manager apps like Cydia, Sileo, and Zebra on jailbroken devices, you can also install package manager apps on non-jailbroken devices so that you can take advantage of add-ons for the MacDirtyCow and kfd exploits.
Many of our readers might be familiar with Cowabunga, an all-inclusive system customization app for both jailbroken and non-jailbroken devices that works by way of TrollStore or the MacDirtyCow exploit.