Mobile exploit database
    root@mhfh:~# ./db --stats → ios=4 android=4 critical=4

    Mobile Exploit Database

    A curated archive of iOS and Android vulnerabilities — CVE metadata, affected versions, proof-of-concept code and downloadable artefacts. Search, filter, and pivot into the full write-up for any entry.

    root@mhfh:~#grep -r 'CVE' /var/db/exploits/
    db/ios_exploit_db.json
    🍎 iPhone Exploit DB
    4 entries
    cd ./ios →
    db/android_exploit_db.json
    🤖 Android Exploit DB
    4 entries
    cd ./android →
    exploit-db.sh --query
    $ platform:
    $ severity:
    CVEPlatformTitleTypeSev
    CVE-2024-23222iOSWebKit RCE via type confusionRCECriticalcat →
    CVE-2024-44308iOSJavaScriptCore UXSS chainRCECriticalcat →
    CVE-2023-41064iOSBLASTPASS ImageIO 0-click0-clickCriticalcat →
    CVE-2022-32893iOSWebKit OOB write → kernel LPELPECriticalcat →
    CVE-2024-32896AndroidPixel firmware privilege escalationLPEHighcat →
    CVE-2024-43093AndroidFramework path traversal sandbox escapeSandboxHighcat →
    CVE-2023-21492AndroidSamsung kernel pointer leakInfoLeakMediumcat →
    CVE-2023-20963AndroidWorkSource parcel mismatch (in-the-wild)LPEHighcat →
    root@mhfh:~#ssh client@mhfh.io
    secure_channel.enc

    $ Open a secure channel. PGP preferred. Pre-engagement NDA available on request.

    email: info@mobilehackerforhire.com
    pgp.fingerprint: 4096R/A1B2 C3D4 E5F6 7890 1234
    tor: mhfh3xpl0it.onion