2026-03-07 16:30:00 +07:00
2026-03-07 16:30:00 +07:00
2026-03-08 07:39:21 +07:00
2026-03-11 16:50:56 +07:00
2026-03-11 11:00:37 +07:00
2026-03-08 07:14:53 +07:00
2026-03-07 12:58:07 +07:00
2026-03-08 07:39:21 +07:00
2026-03-07 12:58:07 +07:00
2026-03-07 15:18:58 +07:00
2026-03-07 12:58:07 +07:00
2026-03-07 12:58:07 +07:00
2026-03-07 15:18:58 +07:00
2026-03-07 12:58:07 +07:00
2026-03-11 16:50:56 +07:00
2026-03-07 13:18:06 +07:00

Coruna

The leaked exploit toolkit for various iOS versions. Extracted from https://sadjd.mijieqi[.]cn/group.html

Partially deobfuscated, symbolicated, and modified to load decrypted payloads by Claude (thanks @34306 for sponsor) and by hand.

These scripts are modified in a way that allows you to host them locally. Note that this only includes exploit chains for tested devices.

Analysis

There are so many analysis by other people right now so I'm not doing it again, however I have a generated ANALYSIS.md specifically talking about decryption process and iOS payloads version table.

Tested on

Device Version WebKit exploit chain
iPhone 6s+ 15.4.1 jacurutu -> VariantB?
iPhone Xs Max 16.5 terrorbird -> seedbell -> VariantB
iPhone 15 Pro Max 17.0 cassowary -> seedbell_pre -> seedbell_17 -> VariantB
S
Description
No description provided
Readme 9.4 MiB
Languages
JavaScript 98.5%
HTML 1.4%