Skip to content

Patching binaries itself #9

@joeyoropesa-dev

Description

@joeyoropesa-dev

What about creating a way for patching binary files itself so that with using Misaka package manager that works thanks to the Mac Cow Dirty bug with TrollStore, it can give a full support for running modified read-only binaries from the location of the tweak inside that app it can injects to the original binary patch with the same permissions execution just like original file.

In that way basically, AppSync Unified tweak (dylib patches) can be used to patch original installd file that is taken (copied) from the user's/dev's device into Misaka tweak directory and to sign the binary using TrollStore bug ldid command and to just turn on the Misaka tweak to apply changes to the file, respring the device, allow the tweak to run in the background and done.

Now non-jailbroken iDevices that is vulnable to those 2 bugs and exploits it can peacefully enjoy in installing normally any unsigned app for jailbreak and run it without getting stopped by amfi because everything is bypassed thanks to the tweak and it will lasts forever even after reboot without any PC

In that way, AppSync Unified Untethered is born!

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions