1
0
Fork 0
mirror of https://github.com/khanhduytran0/coruna.git synced 2026-05-13 22:33:35 -04:00
The leaked exploit toolkit for various iOS versions
  • JavaScript 98.5%
  • HTML 1.4%
Find a file
Duy Tran f3093b7364
Merge pull request #22 from ghh-jb/main
iOS 15.0-16.2 userspace PAC bypass (breezy15) and iOS 15.6-16.1.2 WebContent r/w (bluebird) made functional
2026-04-10 19:16:59 +07:00
downloaded Add all decrypted files 2026-03-07 16:30:00 +07:00
extracted Add all decrypted files 2026-03-07 16:30:00 +07:00
other Cleanup 2026-03-08 07:39:21 +07:00
payloads Disable automatic crash reporter deleting for entry4_type0x0a.dylib 2026-03-12 06:05:29 +07:00
SpringBoardTweak TMP 2026-03-10 21:04:56 +07:00
.gitignore Initial commit 2026-03-07 12:58:07 +07:00
ANALYSIS.md TMP 2026-03-10 21:04:56 +07:00
group.html Add confirm dialog back 2026-03-08 07:14:53 +07:00
platform_module.js Initial commit 2026-03-07 12:58:07 +07:00
README.md Add warning 2026-03-25 07:18:52 +07:00
Stage1_15.2_15.5_jacurutu.js Initial commit 2026-03-07 12:58:07 +07:00
Stage1_15.6_16.1.2_bluebird.js Add support for bluebird WebContent r/w exploit on iOS 15.6-16.1.2. 2026-04-06 22:19:26 +03:00
Stage1_16.2_16.5.1_terrorbird.js Initial commit 2026-03-07 12:58:07 +07:00
Stage1_16.6_17.2.1_cassowary.js Fix 17.0 2026-03-07 15:18:58 +07:00
Stage2_15.0_16.2_breezy15.js Added support for iOS 15.0-16.2 breezy15 userspace PAC bypass. 2026-04-06 22:16:35 +03:00
Stage2_16.3_16.5.1_seedbell.js Initial commit 2026-03-07 12:58:07 +07:00
Stage2_16.6_16.7.12_seedbell.js Initial commit 2026-03-07 12:58:07 +07:00
Stage2_16.6_17.2.1_seedbell_pre.js Fix 17.0 2026-03-07 15:18:58 +07:00
Stage2_17.0_17.2.1_seedbell.js Initial commit 2026-03-07 12:58:07 +07:00
Stage3_VariantB.js Add confirm dialog back 2026-03-08 07:14:53 +07:00
utility_module.js undefined is not a function error in rshift. Fix for PAC bypass breezy15. 2026-04-07 08:16:50 +03:00

Coruna

Caution

This repository hosts captured malicious payloads and is intended for educational and research purposes only. While all C2 URLs have been shut down, the payloads may still contain potentially harmful code.

The leaked exploit toolkit for various iOS versions. Extracted from https://sadjd.mijieqi[.]cn/group.html

Partially deobfuscated, symbolicated, and modified to load decrypted payloads by Claude (thanks @34306 for sponsor) and by hand.

These scripts are modified in a way that allows you to host them locally. Note that this only includes exploit chains for tested devices.

Analysis

There are so many analysis by other people right now so I'm not doing it again, however I have a generated ANALYSIS.md specifically talking about decryption process and iOS payloads version table.

Tested on

Device Version WebKit exploit chain
iPhone 6s+ 15.4.1 jacurutu -> VariantB?
iPhone Xs Max 16.5 terrorbird -> seedbell -> VariantB
iPhone 15 Pro Max 17.0 cassowary -> seedbell_pre -> seedbell_17 -> VariantB