If not allowed to discuss, mods plz feel free to remove asking more just in desperation as i dont know who else to ask! Thanks. Why is no one talking about gecko toolkit? I have looked at a ton of forums and most people haven't spoken about it since 2013. Has anyone done this recently and has success? any and all information would be beneficial. Has anyone attempted using a VM and had success? from what i've read windows 8.1 is what you need along with 3.5 net framework and java 7. Exploit sent Preparing to load the ramdisk. Here is the commmand thread it shows: Using syringe to exploit the bootrom. If anyone has used gecko toolkit and wouldn't mind help with explaining what they know. My problem is when it gets to the point where its supposed to have the apple logo and a progress bar, instead, it kicks my iPod out of DFU mode and it stays in recovery mode with the iTunes logo on it. My old ipod touch 4th gen is disabled for like 43 years and I have some photos of some recently deceased family members on the ipod i'd very much like to recover. But I do want to be clear I own this ipod, I was the first and only owner of this ipod. To start yes I am aware if I still have the original reciept and box apple can unlock my ipod for me, but i got the ipod when I was like 12 so safe to say that’s no longer an option. Looking for iPods or repair parts? Go check out Elite Obsolete Electronics! We deem the sharing of Patreon-exclusive content piracy and will punish as such. Pirated content will be deleted without warning, unless you can prove that the content is legally in the public domain. Links (either indirect or direct) to pirated content are forbidden due to legal concerns. Any known distribution of illegal content will be reported to the relevant authorities. Piracy & Illegal Content - Illegal content of any kind is prohibited. Keep on-topic - Personal attacks, trolling/baiting or flooding (posting multiple repetitive lines or large amounts of code) of the guild and/or its' users will not be tolerated.ģ. If you think you should not say something, the best practice is to not say what you were going to say.Ģ. We define hate speech as "abusive or threatening speech or writing that expresses prejudice against a particular group, especially on the basis of race, religion, or sexual orientation." Cursing is allowed. People are entitled to different opinions, and we ask that our members respect them. Respect - Do not engage in racism or hate speech. News, apps, accessories, rumors and general discussion.ġ. ![]() Play nice, support each other and encourage learning.Welcome to /r/iPod, a subreddit just for the iPod device. We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g. Offering to do these things will also result in a ban.Asking how to get into your "girlfriend's" instagram.This is not the place to try to find hackers to do your dirty work and you will be banned for trying. Discussion around the legality of issues is ok, encouraging or aiding illegal activities is not Hacking can be a grey area but keep it above board. "TeenagerĪrrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering". ![]() Guides and tutorials are welcome here as long as they are suitably complex and most importantly legal!īans are handed out at moderator discretion.Īnother one got caught today, it's all over the papers. This sub is aimed at those with an understanding of hacking - please visit /r/HowToHack for posting beginner links and tutorials any beginner questions should be directed there as they will result in a ban here. ![]() What we are about: quality and constructive discussion about the culture, profession and love of hacking. A subreddit dedicated to hacking and hacking culture.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |