Downloads, Hacking Tools, Haxx, Unsandboxed, Untethered

Haxx – Untethered + Unsandboxed Code Execution Haxx As Root On iOS 14 – iOS 14.8.1

Untethered + Unsandboxed code execution haxx as root on iOS 14 – iOS 14.8.1.

Based on CoreTrustDemo, also please note that certificates are not copyrightable.


Note: requires macOS + existing jailbreak

Get up and running

  1. On your mac import dev_certificate.p12 into the keychain, and the password is password.
  2. Modify haxx.c to include your own code (if you need it).
  3. Run make to build
  4. On the device, Copy /System/Library/PrivateFrameworks/CoreAnalytics.framework/Support/analyticsd to /System/Library/PrivateFrameworks/CoreAnalytics.framework/Support/analyticsd.back
  5. Then replace /System/Library/PrivateFrameworks/CoreAnalytics.framework/Support/analyticsd with /usr/bin/fileproviderctl
  6. Create the /private/var/haxx directory, mode should be 0777
  7. Copy fileproviderctl_internal and haxx generated from the build to /usr/local/bin on the device, mode should be 0755.
  8. Profit.

Fixing fileproviderctl

After doing the above steps, fileproviderctl will be broken, to fix it do the following steps

  1. Grab a copy of /usr/bin/fileproviderctl on your device to your mac
  2. Patch the binary with GNU sed: gsed -i 's|/usr/local/bin/fileproviderctl_internal|/usr/local/bin/fileproviderctl_XXXXXXXX|g' fileproviderctl
  3. Resign it: codesign -s "Worth Doing Badly iPhone OS Application Signing" --preserve-metadata=entitlements --force fileproviderctl
  4. Put the fixed binary back onto your device.


To remove the installation, do the following steps

  1. Copy /System/Library/PrivateFrameworks/CoreAnalytics.framework/Support/analyticsd to /usr/bin/fileproviderctl
  2. Move /System/Library/PrivateFrameworks/CoreAnalytics.framework/Support/analyticsd.back to /System/Library/PrivateFrameworks/CoreAnalytics.framework/Support/analyticsd
  3. Delete /var/haxx, /usr/local/bin/fileproviderctl_internal as well as /usr/local/bin/haxx

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend