Pinned Repositories
Android-Pin-Bruteforce-2
Turn your Kali Linux PC or Kali Nethunter phone into a brute-force PIN cracker of Android devices
checkm8_5c
Refactoring the checkm8 exploit and testing it on specially the iPhone 5C
clock-App
Custom Clock App With GetX And Dark Theme & Light Mode
eclipsa
Checkm8 PoC tool for A8, A8X and A9 devices that allows you to boot untrusted images (macOS only, credits: checkra1n team).
edl
Inofficial Qualcomm Firehose / Sahara / Streaming / Diag Tools :)
github-readme-stats
:zap: Dynamically generated stats for your github readmes
iCloud-Bypass-Server
Icloud_Bypass_server
iOS15-Bypass-Hello
Windows => Download GitBash.exe | Support Windows and Linux
SimplePassCodeBypass
A Simple Passcode Bypass for iDevice lock
SuccessionDown
Tethered downgrades on device!
AushaTeam's Repositories
AushaTeam/Android-Pin-Bruteforce-2
Turn your Kali Linux PC or Kali Nethunter phone into a brute-force PIN cracker of Android devices
AushaTeam/ipwndfu
Supports s5l8960x (iPhone 5s) and - new - t8011 (iPad Pro 2017)[t8012]
AushaTeam/KDFU-Iphone4S-6.1.3
AushaTeam/android_kernel_xiaomi_mt6768
cloned from https://github.com/Redmi-MT6768/android_kernel_xiaomi_mt6768
AushaTeam/auto-py-to-exe
Converts .py to .exe using a simple graphical interface
AushaTeam/checkm8-A5X-developing-test
fork from axi0mXさん(ipwndfu)とa1exdandyさん(S8003 patch) ホントにありがとうございます!!. for my weird research only. **If u don’t know how to coding pls don’t download and try this repo!! I don’t guarantee anything that will happen to u (゚∀゚)**
AushaTeam/checkra1n-0.12.4-A9X-iOS-14.5-Script
A tiny little script to run checkra1n 0.12.4 on A9X devices with iOS 14.5 or higher
AushaTeam/CMake
Mirror of CMake upstream repository
AushaTeam/fastboot.js
JavaScript implementation of the Android fastboot protocol, using WebUSB
AushaTeam/hyperactive
The hyperactive suite of web application development tools
AushaTeam/img4lib
image4 vfs
AushaTeam/imobiledevice-net
.NET (C#, VB.NET,...) bindings for libimobiledevice
AushaTeam/iomfb-exploit
Exploit for CVE-2021-30807
AushaTeam/ipwndfu-1
ipwndfu with support for loading unsigned iBSS on A5(X) devices. Use ./ipwndfu -l <YOUR iBSS>
AushaTeam/mtkclient
Inofficial MTK reverse engineering and flash tool
AushaTeam/normalize.css
A modern alternative to CSS resets
AushaTeam/p0insettia
A tool for [(semi-){un-(tethered jailbreak)}] of iOS 10.3.x 32-bit devices with checkm8 BootROM exploit.
AushaTeam/PS4xploit
PS4 Exploit list
AushaTeam/Python-Apple-EFI-Patcher-V2
Python Based Apple EFI Patcher. Version 2
AushaTeam/space-tourism
A collaboration between Frontend Mentor, Scrimba, and Kevin Powell
AushaTeam/telnetd_ramdisk
Creates and boots a RAMDisk with telnet access on some checkm8 vulnerable devices
AushaTeam/TR-TECH-GUIDE
Config files for my GitHub profile.
AushaTeam/twrp_redmi_begonia
TWRP source for Redmi Note 8 Pro
AushaTeam/udemy-downloader-gui
A desktop application for downloading Udemy Courses
AushaTeam/unlocker
VMware Workstation macOS
AushaTeam/unlocker-1
AushaTeam/WhatsApp-GD-Extractor
Allows WhatsApp users on Android to extract their backed up WhatsApp data from Google Drive.
AushaTeam/WhatsApp2iOS
Short tutorial to transfer WhatsApp messages from an Android phone to iOS
AushaTeam/xiaomi-flashable-firmware-creator
Xiaomi Flashable Firmware Creator
AushaTeam/xpwn
A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone