From 0ac998c5d404fd222ca048b0ef19eb721409b764 Mon Sep 17 00:00:00 2001 From: kxtzownsu Date: Sat, 1 Mar 2025 04:13:57 -0500 Subject: [PATCH] passphrase notice --- README.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 0f9211d..1d3cc0f 100644 --- a/README.md +++ b/README.md @@ -6,9 +6,6 @@ An exploit for Chrome devices which allows people to unenroll devices with devic > ANYTHING GOOGLE CAN REMOTELY PERFORM ON YOUR DEVICE, ICARUS CAN BE USED TO DO. AN EXAMPLE OF THIS IS INSTALL EXTENSIONS, SPY, USE YOUR CAMERA, REMOTE INTO YOUR DEVICE, GET YOUR PASSWORDS, AND MORE.

> ONLY SELF HOST ICARUS, NEVER USE A PUBLIC SERVER! -## New configs? -"New configs" have rolled keys. We are testing the compatibility of these new keys for interception. - ## Setup and installation instructions Clone the repo with ``git clone --recursive https://git.kxtz.dev/kxtzownsu/icarus/` and change directory to it. @@ -60,6 +57,12 @@ Reboot the device. You'll boot into verified mode. Once you have your server run - If that didn't work, powerwash your device and re-run the modified shim, and keep the server running. +
+ make_out.sh is prompting me for a password! + + The password is 'icarus' without quotes. +
+ ## Credits - [MunyDev](https://github.com/MunyDev) - Creating this exploit - [Archimax](https://github.com/EnterTheVoid-x86) - Cleaning up get_original_data.sh and inshim.sh + README changes