Duy Tran f3093b7364 Merge pull request #22 from ghh-jb/main
iOS 15.0-16.2 userspace PAC bypass (breezy15) and iOS 15.6-16.1.2 WebContent r/w (bluebird) made functional
2026-04-10 19:16:59 +07:00
2026-03-07 16:30:00 +07:00
2026-03-07 16:30:00 +07:00
2026-03-08 07:39:21 +07:00
TMP
2026-03-10 21:04:56 +07:00
2026-03-07 12:58:07 +07:00
TMP
2026-03-10 21:04:56 +07:00
2026-03-08 07:14:53 +07:00
2026-03-07 12:58:07 +07:00
2026-03-25 07:18:52 +07:00
2026-03-07 12:58:07 +07:00
2026-03-07 15:18:58 +07:00
2026-03-07 12:58:07 +07:00
2026-03-07 12:58:07 +07:00
2026-03-07 15:18:58 +07:00
2026-03-07 12:58:07 +07:00
2026-03-08 07:14:53 +07:00

Coruna

Caution

This repository hosts captured malicious payloads and is intended for educational and research purposes only. While all C2 URLs have been shut down, the payloads may still contain potentially harmful code.

The leaked exploit toolkit for various iOS versions. Extracted from https://sadjd.mijieqi[.]cn/group.html

Partially deobfuscated, symbolicated, and modified to load decrypted payloads by Claude (thanks @34306 for sponsor) and by hand.

These scripts are modified in a way that allows you to host them locally. Note that this only includes exploit chains for tested devices.

Analysis

There are so many analysis by other people right now so I'm not doing it again, however I have a generated ANALYSIS.md specifically talking about decryption process and iOS payloads version table.

Tested on

Device Version WebKit exploit chain
iPhone 6s+ 15.4.1 jacurutu -> VariantB?
iPhone Xs Max 16.5 terrorbird -> seedbell -> VariantB
iPhone 15 Pro Max 17.0 cassowary -> seedbell_pre -> seedbell_17 -> VariantB
S
Description
No description provided
Readme 9.4 MiB
Languages
JavaScript 98.5%
HTML 1.4%