mobilehackerforhire — iPhone & Android forensics specialist

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
    root@mhfh:~# whoami
      __  __  _   _  _____  _   _ 
     |  \/  || | | ||  ___|| | | |
     | |\/| || |_| || |_   | |_| |
     | |  | ||  _  ||  _|  |  _  |
     |_|  |_||_| |_||_|    |_| |_|
     mobile · hacker · for · hire
    

    $ cat /etc/profile

    > The iPhone & Android specialist. Mobile phone forensics, deep device analysis, and weaponized research.

    $ ./scope --list

    iOS jailbreak chains · Android root vectors · baseband recon · MDM bypass · acquisition · chip-off

    UPTIME
    1337d
    EXPLOITS
    284
    DEVICES
    iOS · AOSP
    STATUS
    ONLINE
    root@mhfh:~# ./triage --interactive

    Symptom Triage Wizard

    Answer a few questions about your iPhone, Android, Instagram or WhatsApp incident and we'll route you to the right playbook.

    triage.sh — symptom router
    root@mhfh:~/triage# ./ask --step=1

    Which device or account is showing the problem?

    // Pick the surface where the symptoms first appeared.

    root@mhfh:~#grep -r 'CVE' /var/db/exploits/
    db/ios_exploit_db.json
    🍎 iPhone Exploit DB
    4 entries
    cd ./ios →
    db/android_exploit_db.json
    🤖 Android Exploit DB
    4 entries
    cd ./android →
    exploit-db.sh --query
    $ platform:
    $ severity:
    CVEPlatformTitleTypeSev
    CVE-2024-23222iOSWebKit RCE via type confusionRCECriticalcat →
    CVE-2024-44308iOSJavaScriptCore UXSS chainRCECriticalcat →
    CVE-2023-41064iOSBLASTPASS ImageIO 0-click0-clickCriticalcat →
    CVE-2022-32893iOSWebKit OOB write → kernel LPELPECriticalcat →
    CVE-2024-32896AndroidPixel firmware privilege escalationLPEHighcat →
    CVE-2024-43093AndroidFramework path traversal sandbox escapeSandboxHighcat →
    CVE-2023-21492AndroidSamsung kernel pointer leakInfoLeakMediumcat →
    CVE-2023-20963AndroidWorkSource parcel mismatch (in-the-wild)LPEHighcat →
    root@mhfh:~#man ./tutorials/

    hands on technical write-ups. Each post takes a CVE from the exploit DB and walks through triggering, weaponizing, and detecting the bug.

    posts/cve-2024-23222.md
    CVE-2024-23222· 18 min

    Weaponizing WebKit Type Confusion for iOS RCE

    We walk through triggering the type confusion in JavaScriptCore, building a fake object primitive, and pivoting to arbitrary read/write inside Safari on iOS 17.3.

    function trigger() {
      let arr = [1.1, 2.2, 3.3];
      let oob = new ArrayBuffer(0x1000);
      arr.__proto__ = oob.__proto__;
      return arr[0x100];
    }
    iOSWebKitRCESafari
    read --full →
    posts/cve-2024-32896.md
    CVE-2024-32896· 22 min

    Rooting Pixel via Firmware Privilege Escalation

    Step-by-step exploitation of a Pixel-specific bootloader logic flaw to land a persistent root shell without unlocking the bootloader.

    adb shell /data/local/tmp/exploit.bin --trigger
    ./pixel-lpe --target=oriole --kaslr-leak
    AndroidPixelLPEFirmware
    read --full →
    posts/cve-2023-41064.md
    CVE-2023-41064· 31 min

    Reproducing BLASTPASS: 0-click iMessage Implant

    Reverse engineering Apple's ImageIO PassKit attachment chain. We rebuild a malformed WebP that bypasses BlastDoor and lands code execution.

    python3 forge_webp.py --huff-overflow 0x4141 --out blast.webp
    python3 wrap_pkpass.py --payload blast.webp --recipient target@icloud
    iOS0-clickiMessageImageIO
    read --full →
    posts/cve-2023-20963.md
    CVE-2023-20963· 14 min

    WorkSource Parcel Mismatch — Android In-the-Wild LPE

    Dissecting the parcel/unparcel mismatch abused by commercial spyware. Building a reliable exploit against Android 11–13.

    Parcel p = Parcel.obtain();
    WorkSource ws = new WorkSource();
    p.writeInt(0x1337);
    ws.readFromParcel(p);
    ws.writeToParcel(p2, 0);
    AndroidLPEParcel
    read --full →
    root@mhfh:~#ssh client@mhfh.io
    secure_channel.enc

    $ Open a secure channel. PGP preferred. Pre-engagement NDA available on request. Ready to proceed?

    [ INITIATE SECURE CONTACT ]
    email: info@mobilehackerforhire.com
    pgp.fingerprint: 4096R/A1B2 C3D4 E5F6 7890 1234
    tor: mhfh3xpl0it.onion