Top News & Events
News
News
News
News
Events
News
News
News
News
News
Events
News
Advertisement
Website Company
CEO/Founder
Don't Miss Any Merruk !
Be social, Follow US.
| |

OpenSourced Technicals about doulCi Kitchen, Merruk iCloud Bypass.

iCloud bypass is no longer called doulCi, it...


« iCloud bypass is no longer called doulCi, it goes Open Source with the name merruk iCloud bypass Merruk iCloud bypass detailed technical instructions: From the beginning. Is "Merruk iCloud bypass" real? Is it still working? So, how can I be sure? doulCi kitchen, a.k.a 2.0, was an improved version of the old magic line way method of bypassing Apple's iCloud Activation lock. It had the simple name "doulCi", a reverse spelling of iCloud. It was discovered, developed and demoed by Yahya Lmallas @MerrukTechnolog during the first months of 2014. After that, someone else going by the name of minacriss discovered one of the two exploits used by this bypass. The first one is a "CertifyMe" exploit and the second is based on a security flaw on Apple servers that was actually a beginner?s mistake. To be fully patched it would require Data Migration, which would be very time and labor consum ... »
| |

Twitter Accounts! 32M login details go on sale on the dark web

Bad news, you're probably going to have to...


« Bad news, you're probably going to have to change your Twitter password as reports have emerged that 32 million login credentials are being sold on the dark web. Before you point fingers at Twitter though, a report by TechCrunch suggests that the data was gleaned from malware that infected Mozilla Firefox and Chrome browsers. This is the word from LeakedSource, the company who was pointed in the direction of the data dump by a person who also led the firm to hacked data from Russian social network, VK. "This data set contains 32,888,300 records. Each record may contain an email address, a username, sometimes a second email and a visible password. We have very strong evidence that Twitter was not hacked, rather the consumer was," LeakedSource wrote in a blog post. The firm alleges that all the passwords, even those that are supposedly, "uncrackable" were stored in plain text, som ... »
| |

Daydream, Google Allo to Google Home, the highlights from Google I/O 2016

This week, Google I/O 2016 brought together developers...


« This week, Google I/O 2016 brought together developers for a three-day event on the latest technology. Google Home, a voice-activated remote control, stands out among Google's newest member which turns your home into an interactive world - Put your goggles on, fasten your seat belts and get ready for a virtual reality war. Imagine that you are in an ocean and a whale passes by or picture yourself watching a match with a 360-degree view, making you feel like you're cheering in a stadium with thousands of fans. Virtual reality enables people to experience content in as real a way as possible. - Let's try to describe a virtual reality platform for those who have not yet had a chance to experience one. For a virtual reality experience, you put on goggles, which resembles pulling the curtains over your eyes. Then you see options such as games, films or directions that are prepared for a ... »
| |

US drone rules impact Amazon plans

The draft regulations issued by the FAA insist...


« The draft regulations issued by the FAA insist that drones must remain within the line of sight of their pilot. The Federal Aviation Administration's (FAA) draft rules for the use of drones in US airspace do not permit Amazon to launch its Amazon Air delivery service. The draft rules state that pilots must remain within eyesight of their unmanned crafts, although it said it would consider factoring in a second line of sight in some cases. Pilots must also be FAA certified to operate drones. Amazon said it remained "committed" to its plans for delivery via drone. "We are committed to realising our vision... and are prepared to deploy where we have the regulatory support we need," said Paul Misener, Amazon's vice-president of global public policy. The firm had said last year that in terms of the technology required for Amazon Air, it was ready to launch as soon as regulat ... »
| |

Drone maker DJI opts for Micro Four Thirds standard

Camera manufacturer Olympus has been fighting hard since...


« Camera manufacturer Olympus has been fighting hard since 2008 to promote its Micro Four Thirds standard, and it just received a huge boost of support from three companies ? most notably drone maker DJI. For those that don't know, Olympus explains that the Micro Four Thirds standard has been developed with a number of things in mind when it comes to photography, but most importantly optimization of size, performance and extendibility. It also means that through its standardized lens mount, photographers will be able to make use of interchangeable lenses and cameras from different manufacturers. What this means from DJI though, is that the drone maker will be fitting its own cameras of the Micro Four Thirds variety onto the drones that it manufactures. This comes in addition to DJI making it possible for drone flyer's to attach GoPro cameras. ?With the addition of exciting new pr ... »
| |

Maroc-OS's Goodbye Article Introduction.

- Hello everyone, As I've said many times,...


« - Hello everyone, As I've said many times, DOULCI STOPPED WORKING ON EVERYTHING TO THE iCLOUD BYPASS QUITE SOME TIME AGO. We were attacked on numerous occasions for not releasing the second tool (the doulCi Bypass, a.k.a. iCloud Hack or iCloud Activation lock bypass) quick enough and we continue to be under attack to date. And still, we were under a continuous barrage of hostilities. “Not cool!”, This led me to stop working on icloud and to leave Apple altogether. - I announced that we would release the tool source code (doulCi Server) as an github, but we have not so far. Why, you ask? Because I was quite angry with those who attacked us, when all the time I was working for free, telling the world that "APPLE'S ICLOUD ACTIVATION LOCK IS NOT SECURE AND BYPASSING IT IS CHILD’S PLAY". However, after discussing things with my brother and partners from the doulCi ... »
| |

R0bf0rdSn0w proxy Write up

R0bf0rdSn0w! Has no one actually been able to...


« R0bf0rdSn0w! Has no one actually been able to get this so far? Want to know how it works? Following is our exploit write up? What is R0bf0rdSn0w? What files are used? How does it work? What is R0bf0rdSn0w? - R0bf0rdSn0w is an iCloud bypass proxy developed by iH8Sn0w that was not made public, as you know. You need a code to unpack it :) Getting the code requires an A5+ exploit, (if you have one, you have no need for R0bf0rdSn0w!). - This is first two useless AES GID keys used for the decryption process of R0bf0rdSn0w. What files are used? - The main files are in the ZIP: -rwxr-xr-x@ 1 iH8sn0w staff 895 Mar 31 14:41 iPhoneDeviceCA_private.pem -rwxr-xr-x@ 1 iH8sn0w staff 148512 Mar 31 14:45 proxy -rwxr-xr-x@ 1 iH8sn0w staff 3990 Mar 31 14:46 iPhoneDeviceCA.pem -rwxr-xr-x@ 1 iH8sn0w staff 3960 Mar 31 14:47 iPhoneActivation.pem -rwxr-xr-x@ 1 iH8sn0w s ... »
| |

doulCi Kitchen, a.k.a. doulCi 2.0

What is doulCi Kitchen ? - doulCi Kitchen is...


« What is doulCi Kitchen ? - doulCi Kitchen is the new version of doulCi, i.e., doulCi 2.0, and it's a new level of iOS hacking concept. It follows along the same lines as the first doulCi idea (doulCi Server), but this time a different logic and tools are used. - doulCi Kitchen uses a very nice and easy idea that provides a better iCloud Activation Lock Bypass that can even be longer, depending on how well it is implemented (I am not going to release the tool, but I'll give you the concept write up explaining how it works ). How does it Work? - As I said before, I am not going to release the tool, but I will briefly outline the concept. The following illustration should help explain: PROXY: Could be by wifi, OTA, itunes or other idevice-management software. doulCi KITCHEN: This is the actual 0 day exploit for all iDevices, including a patched lockwdown binary. Yo ... »
News and updates on what we're up to.
Subscribe to our newsletter

Latest News & Events :

« News »Radioshack in the hands of Amazon ? - Amazone looking to replicate Apple’s success with its own new stores.

Amazone looking to replicate Apple’s s...

Read More!
« News »Motorola returns to China with the Moto X Pro, a repackaged Nexus 6. - Motorola Mobility would eventually be making a comeback in China..

Motorola Mobility would eventually be ma...

Read More!
« News »iWork iCloud apps now support every platform, no need to have an iDevice - Apple Pages, Numbers and Keynote for iCloud available to anyone..

Apple Pages, Numbers and Keynote for iCl...

Read More!
« News »Activation Lock Status an Apple reaction to doulCi bypass - Apple’s new tool will help you determine if an iPhone are a second hand icloud locked..

Apple’s new tool will help you determi...

Read More!
« News »How to track Android locked devices? - Android Device Manager lets you find your Android phone.

Android Device Manager lets you find you...

Read More!
« News »How to Upgrade the PS4 Hard Drive - You got a new Hard Disk Drive and want to upgrade your old PS4 500Gb HDD?.

You got a new Hard Disk Drive and...

Read More!
« News »Samsung and LG head to court over ‘vandalized’ washing machines - Samsung and LG’s upcoming courtroom showdown involves.

Samsung and LG’s upcoming courtroom sh...

Read More!
« Events »BlackBerry Passport, Classic to land at AT&T on Feb. 20 - Months after its unveiling, the squat smartphone is finally coming to a US carrier..

Months after its unveiling, the squat sm...

Read More!
« News »After iPhone iOS, IFTTT brings its task magic to Android - If This Then That Popular web automation service (IFTTT) has released the Android app.

If This Then That Popular web automation...

Read More!
« News »iOS 8 hits 72% adoption in latest data - Apple last reported data iOS 8 adoption up with 3% .

Apple last reported data iOS 8 adoption ...

Read More!
« News »31 data records were lost or stolen every second in 2014 - data breaches comes from online security firm Gemalto’s.

data breaches comes from online security...

Read More!
« Events »Next Apple store china will open doors - February 7 at 10:00 AM Local, Apple open's its latest retail store in Tianjin.

February 7 at 10:00 AM Local, Apple open...

Read More!

// //