Linus Henze

@LinusHenze

macOS and iOS Fan. Part of and .

Koblenz, Germany
Vrijeme pridruživanja: veljača 2016.

Tweetovi

Blokirali ste korisnika/cu @LinusHenze

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LinusHenze

  1. Prikvačeni tweet
    2. velj

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Prikaži ovu nit
    Poništi
  2. prije 16 sati

    Another quick update: I’ve added experimental MobileSubstrate support. Bloard and PreferenceLoader work, Anemone will cause Safe Mode to be entered.

    Prikaži ovu nit
    Poništi
  3. prije 17 sati

    Quick update: NewTerm and other Apps that do not rely on tweak injection work now

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    19. pro 2019.

    Now live! 🔺The new Apple Security Bounty! 🔺The new Apple Platform Security guide, featuring Mac for the first time! (PDF version: ) 🔺My Black Hat 2019 talk: Happy holidays! 🎄

    Poništi
  5. 28. lis 2019.

    Say Hello to Sileo! (iPad Pro 2017, iPadOS 13.1.3, custom Jailbreak, not checkra1n)

    Poništi
  6. proslijedio/la je Tweet
    10. lis 2019.

    Guess what and I did today 😝 Verbose boot on iPhone7 using

    Poništi
  7. 3. lis 2019.

    Now something you didn’t see before: iPad Pro (2017) verbose boot (iOS 13.1)

    Poništi
  8. 2. lis 2019.

    I’ve added support for t8011 (iPad Pro 2017) to my fork! Fully supports unsigned img4 loading!

    Poništi
  9. 30. ruj 2019.

    I've created a modified version of checkm8 that doesn't cause your iPhone to crash when loading img4 images (e.g. iBSS): Also includes a signature check removal tool to load unsigned images (currently only supports iPhone 5s, only patches SecureROM).

    Poništi
  10. 29. ruj 2019.

    Verbose boot is cool, but I know y’all want this Thanks for the exploit!

    Poništi
  11. proslijedio/la je Tweet
    17. ruj 2019.

    Wrote my first Kernel Exploit for a MacOS 0day. It was so much fun and I learned a lot \o/. Credit for the bug goes to (and ?) ;D Code:

    Poništi
  12. proslijedio/la je Tweet

    Ahead of new iPhone day tomorrow, I dug into how WebKit's and iMessage's bugs have put a whole lot of dents into iOS's reputation as the most secure mainstream operating system on the market:

    Poništi
  13. 4. ruj 2019.

    My pwning your kernelz challenge from the finally got its first solve, from ! See his writeup and enjoy the 0day while it lasts ;)

    Poništi
  14. 23. kol 2019.

    New challenge released! pwning your kernelz, a macOS 0day LPE challenge!

    Poništi
  15. 23. kol 2019.

    The CCCamp CTF hosted by has started and features a Keychain Challenge authored by me! Spoiler: 0days might be required ;) (And yes, we‘ve got a solution (there are at least two ways to solve this challenge). Writeup will be published afterwards)

    Poništi
  16. proslijedio/la je Tweet
    23. kol 2019.
    Poništi
  17. proslijedio/la je Tweet
    5. kol 2019.

    Let’s talk about KeySteal. Watch Linus () talk “KeySteal: A Vulnerability in Apple’s Keychain.”

    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    2. kol 2019.

    Happy Aloha Friday! Just uploaded all talks from "Objective by the Sea" v2.0 to YouTube 📽️😍 v2.0 video playlist:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    23. srp 2019.

    So we are throwing a party at Blackhat/DEFCON. ZecOps 'Not Stealthy' Party: Thursday, August 8th, 9pm-midnight. RSVP at

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·