Homebrew Exploits: Difference between revisions
Line 50: | Line 50: | ||
==Secondary Exploits== | ==Secondary Exploits== | ||
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. | Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. | ||
'''Again, these exploits are only at best proven to work on 10.7.0-32!!! These may no longer function in 11.0.0-33!!!''' | |||
{| class="wikitable" border="1" | {| class="wikitable" border="1" |