mirror of
https://github.com/khanhduytran0/coruna.git
synced 2026-04-25 05:06:54 +02:00
84ca8390c602a8ae6e76f6f63b56516268ad4c8f
Ran command: gsed -i 's/CrashReporter/CrashReporte_/g' payloads/*/*.dylib
Coruna
The leaked exploit toolkit for various iOS versions. Extracted from https://sadjd.mijieqi[.]cn/group.html
Partially deobfuscated, symbolicated, and modified to load decrypted payloads by Claude (thanks @34306 for sponsor) and by hand.
These scripts are modified in a way that allows you to host them locally. Note that this only includes exploit chains for tested devices.
Analysis
There are so many analysis by other people right now so I'm not doing it again, however I have a generated ANALYSIS.md specifically talking about decryption process and iOS payloads version table.
Tested on
| Device | Version | WebKit exploit chain |
|---|---|---|
| iPhone 6s+ | 15.4.1 | jacurutu -> VariantB? |
| iPhone Xs Max | 16.5 | terrorbird -> seedbell -> VariantB |
| iPhone 15 Pro Max | 17.0 | cassowary -> seedbell_pre -> seedbell_17 -> VariantB |
Description
Languages
JavaScript
98.5%
HTML
1.4%