Jump to content
  • Sky
  • Mint
  • Azure
  • Indigo
  • Blueberry
  • Blackcurrant
  • Watermelon
  • Strawberry
  • Pomegranate
  • Ruby Red
  • Orange
  • Banana
  • Apple
  • Emerald
  • Teal
  • Chocolate
  • Slate
  • Midnight
  • Maastricht
  • Charcoal
  • Matte Black


  • Content Count

  • Joined

  • Last visited

Community Reputation

49 Trainee

About CorruptedHxR

  • Rank

Profile Information

  • iDevice
    iPhone 6
  • iOS Version
  • Android Device
    Samsung Galaxy S8 & Tab 4 10.1
  • Gender
    Not Telling
  • Location
    Somewhere You're Not
  • Interests
    iOS and Android Security Researching, Hacking (Still Figuring Out), App/Tweak Development, Objective C and C++ Learning. Any help is great!

Recent Profile Visitors

570 profile views
  1. Lldb or gdb watchpoints are not the things you search and hack in ida, you search and look around that address the lldb or gdb gave you. What old gives you is not the function to hack, installed it's the starting point of looking at what to hack. So look around that function you got when u searched in ida
  2. Uh no I didnt, I didn't even look at others posts. I just know this from previous challenges
  3. 1. Every time you want to breakpoint, do you have to add the ASLR bias to the offset? Yes you do, like armv7 2. Do watchpoints work on arm64? I've tried yes but sometimes they don't, I don't rely too much on them. 3. Do you have to wait for LLDB to process a 64 bit binary? For me, yes it has to. It takes long atleast for me though. 4. What is the 64 bit equivalent to r7? These work for me: x13, w13, w15, w15
  4. - Requirements: 1. Jailbroken iPad or iDevice The School Provides You With 2. Computer With iExplorer OR iFile/Fliza 3. Following Instructions Skills 4. Everything Without Quotes - Tutorial's Content: [Hidden Content] - PROOF: iPad is Charging. Will do ASAP. Sorry - Credits: @CorruptedHxR It is "school property" and not yours. After all, you can get in trouble for it.
  5. I got FaceTime, GameCenter and iMessage working in school wifi too. It was easy to do and I'm the only one in the school who has these.
  6. From my knowledge, you need a total of 7-8 exploits(create them) from loop holes in the operating system. But if ur like Luca Tadesco, then you only need 3-4 cause he's a genius.
  • Recently Browsing   0 members

    No registered users viewing this page.

    • Administrator |
    • Special Rank |
    • ViP Plus |
    • ViP Jailed |
    • ViP |
    • Cheater  |
    • Modder  |
    • Novice Cheater |
    • Rookie Modder |
    • Contributor |
    • Senior Member |
    • Member |
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy - Guidelines