repo.misty.moeWelcome to my repo :) | gh-page

repo.misty.moe Profile

Repo.misty.moe is a subdomain of Misty.moe, ,

Discover repo.misty.moe website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

repo.misty.moe Information

HomePage size: 10.875 KB
Page Load Time: 0.154194 Seconds
Website IP Address: 185.199.111.153

repo.misty.moe Similar Website

APCA | This is the APCA project repo on GitHub.Documentation linked below.
git.apcacontrast.com
IIABA Portal
portal.iiaba.net
Corporate Home Page - Corporate Home Page – MSD Animal Health
vet.diabete-chien-chat.com.fr
Sailing Center Member Page - Santa Barbara Sailing Center Member Page
members.sbsail.com
Web Page Analyzer - free website optimization tool website speed test check website performance repo
analyze.websiteoptimization.com
Page Middle School PTO - Williamson County, TN - Home Page
pagemspto.membershiptoolkit.com
A web page that points a browser to a different page after 0 seconds
anybookserv.franklin.com
Repo vehicles, motorcycles, powersports, RVs, and travel trailers in Ogden, UT - America First Credi
repos.americafirst.com
Repo.com | Online classifieds for used cars, trucks, and other vehicles
bc.repo.com
Home :: PPSSPP Repo
cydia.ppsspp.org
The Software Repo
repo.cat-v.org
Repo Remarketing | Auto Repossession Recovery Management
rms.reporemarketing.com
Repo Portal
cac-repoagent.calamp.com
How to Install AppCake | AppCake Cydia Repo
cydia.iphonecake.com
Used Cars Salt Lake City | American Title Loans Repo Sales | Salt Lake City Car
repos.americantitleloans.com

repo.misty.moe PopUrls

Welcome to my repo :) | gh-page
https://repo.misty.moe/
repo.me
https://repo.misty.moe/apt/

repo.misty.moe Httpheader

Connection: keep-alive
Content-Length: 9872
Server: GitHub.com
Content-Type: text/html; charset=utf-8
Last-Modified: Sun, 12 Nov 2023 07:36:33 GMT
Access-Control-Allow-Origin: *
ETag: "65508081-2690"
expires: Sat, 11 May 2024 20:22:24 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 7B3A:1CC53A:3D1AAC5:3EF0C7E:663FD125
Accept-Ranges: bytes
Age: 0
Date: Sat, 11 May 2024 20:12:24 GMT
Via: 1.1 varnish
X-Served-By: cache-bur-kbur8200088-BUR
X-Cache: MISS
X-Cache-Hits: 0
X-Timer: S1715458344.457950,VS0,VE112
Vary: Accept-Encoding
X-Fastly-Request-ID: 16ca67094953a9d1a25ad57555cd3d7c54babfb3

repo.misty.moe Meta Info

charset="utf-8"/
content="Jekyll v3.9.3" name="generator"
content="Welcome to my repo :)" property="og:title"/
content="en_US" property="og:locale"/
content="http://repo.misty.moe/" property="og:url"/
content="gh-page" property="og:site_name"/
content="website" property="og:type"/
content="summary" name="twitter:card"/
content="Welcome to my repo :)" property="twitter:title"/
content="width=device-width, initial-scale=1" name="viewport"/
content="#157878" name="theme-color"/
content="black-translucent" name="apple-mobile-web-app-status-bar-style"/

repo.misty.moe Ip Information

Ip Country: United States
Latitude: 34.0544
Longitude: -118.244

repo.misty.moe Html To Plain Text

. Welcome to my repo :) View on GitHub Welcome to my repo :) Add to cydia The repo url is http://repo.misty.moe/apt About KernBypass’s iOS 14 arm64e version For DEV only Tested on iOS 14.214.3 Usage Installation Download the attach-detach, mount_bindfs, kernbypass in myrepo Download flexdecrypt, plutil (in Packix and bingner) Download applink (in https://repo.estertion.win/ ) Download http://repo.misty.moe/apt/kernbypass-resource.tar Extract the tar into /var/mobile ( ensure that /var/mobile/kernbypass_asset ) is present On the first run: Run mksparsedmg /var/mobile/kernbypass_asset/kernbypass.dmg (either in mobile shell or root shell is OK) To enable the kernbypass: In the root shell, cd into /var/mobile, and execute ./preparefullroot.sh Then just like the old kernbypass, use the changerootfs To enable kernbypass for a new application Enable that app in settings of kernbypass Before launching of the app, execute ./kernbypass.sh "Your app's bundle ID" , like ./kernbypass.sh jp.co.cygames.princessconnectredive , bundle ID can be found in apps manager) When the app updated, run above command again. Technical Details KernBypass is working by chrooting an app into a fakeroot. The fakeroot is built by linking the required directory. On iOS13, this is achieved by swapping all fields of target folder’s vnode. However on iOS14, with PAC enabled, the system will now check if pointers in vnode matches with the vnode. Thus we can’t simply swapping the vnode. So, we have to find an alternative way to link the folder. Actually, I really found it. For every linked folder, they are either read only (system libraries), or read write (data or temp files). For a normal application, they do not need the temp file, and the only writable location for them is simply the app data container. For RO folders, after analyzed the firmlink/unionmount/bindfs, only bindfs a bindfs filesystem (which you can see in the default mount list), which can be used to to bind two folders (RO only). But bindfs cannot bind as RW folder. But the RW folders are all data container folders(/var/mobile/Containers/Data/Application, so I decided to mount a dmg on these locations. And after fixing Attach-Detach, I’m now able to mount it. However the it seems that the app cannot access the new root like it used to be. And that’s because we didn’t switched the vnode, so the path that system seen is a path that app shouldn’t be able to access. Normally, we can simply remove all sandbox to grant app all access to everywhere. We(I and @XsF1re) have tried that, but sadly iOS14 introduced IOKit hardening, and by default an executable cannot open any IOService, so all game that uses IOGPU will fail :(. We also tried to resign the app with sandbox exemption profile, however we also failed, as system will simply ignore all sandbox exemption rule for all executables located in user bundle path (/bar/containers/) To fix this, I investigated the app launching process, and hooked the runningboardd, then redirected app’s executable to a copy in system application (/Applications/DemoApp.app/kernbypass), and in this way we can make the sandbox to allow the exemption. Then I found that the iOS will assign a brand new container to app each time it updates and moving the container’s content, but as we are in fakeroot, the container won’t be moved. So I instead keep the app’s container in a fixed location, and link to the actually sandbox caontainer path each time the app updates. Now chaining all these pieces, we can build a new KernBypass. About KernBypass’s fakevar version (iOS qe, obsoleted) Before start This version is not that stable and MAY panic you system, and there ARE data-loss risk as this tweak will make the normal reboot/shutdown process fail, which may cause the filesystem failing (so if you still want to use this, don’t restart your phone that much!) Currently we only tested with 13.5, so other version might not work. Feel free to make issue on GH~ Usage OFC, download the modified KernBypass :) download the fakevar.zip , and extract it to /var/mobile/fakevar (whatever method you use to extract, make sure there’s /var/mobile/fakevar/mobile) execute preparerootfs execute changerootfs; disown %1 fin :) How it works??? The original KernBypass is charming, which works pretty well for pokemon go Why? Because KernBypass only chrooted the /, and then direcyly linked /var into the chroot jail. However, many jailbreak app stores their configuration in places like: /var/lib, /var/mobile/Library, /var/mobile/Library/Caches and those app includes the Cydia and apt, so we got killed So how to cope with these checks? we can make a fake /var userdata, and only link those directory we want it to present in /var into chroot Why it’s difficult? In fact there’s pretty much: If we link /var/ to a path in the already mounted /var or /, there will be circular references, making the chroot jail freeze If we use devfs, no file could be created in devfs If we attach the dmg into chroot and link it, then there’s some magic will cause ReportCrash daemon to crash the whole system Considering all the above approaches, the only one that’s working and stable is devfs. Known issue App with AppGroup simply doesn’t work now. (will crash due to [NSFileManager containerURLForSecurityApplicationGroupIdentifier:], seems it’s a appgroup related issue) Currently not work with Chimera due to Sileo storing into some strange directory, but may be fixed The opening speed of apps will slow down a lot, beware :) For developer The source is available at https://github.com/NyaMisty/KernBypass-Public And there’s an AnalysisResults directory, hope you can find some useful information to improve this there :) gh-page is maintained by NyaMisty . This page was generated by GitHub Pages...

repo.misty.moe Whois