What do you mean they don't work for ARM? Are they linux x86 specific exploits or do they just not give root? If there is any assembly or shellcode in the exploits you will have to convert them to ARM from x86 assembly.
It's not guaranteed that that will make the exploit work, but if you don't translate the shellcode you will not get root even if the exploit still exists in the kernel.
the shoryuken exploit is an x86 linux exploit that was modified for ARM under the name m7 for the Tattoo.
I have modified each of those for specific shellcodes, and they still don't return to #.
They have been patched.
As have the asroot2, m5, m6 and try3 exploits.
Just got my replacement phone today just told customer service I was having trouble with my data after uploading 2.1 they shipped it got it in 3 days. I am about to be rooted again. Sorry wrong thread tried to delete it failed.
|hero, root 2.1|
|Thread Tools||Search this Thread|