PSJailbreak Payload Reverse Engineering: Difference between revisions
Jump to navigation
Jump to search
(Created page with "1.it gets control at exploit_entry, which copies the rest of the payload to the fixed address 0x8000000000700000 and jumps to exploit_main. 2.exploit_main copies a resident par...") |
ConradPino (talk | contribs) (redirect to PSJailbreak Exploit Payload Reverse Engineering) |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
#REDIRECT [[PSJailbreak Exploit Payload Reverse Engineering]] | |||
Latest revision as of 09:47, 20 February 2013
Redirect to: