
Borderline Malware? - Maybe.
Cool, Yes.
My first dive into remote connections was a program that could utilize an iOS tweak "Activator" to remotely control any comprimised iPhone.
12/10/21




iOS Communication Utility
Written in Python, graphical interface with tkinter, this program is the prodigy of my beginner python work.
This one-of-a-kind application used SSH to send commands to any iOS device that was both jailbroken, and had Activator installed.
Built-in Services
Media controls
Location spoofer
App Library
Control Center
Sound Library
Hardware Emulators
Passcode Spoofer
Custom Host & Port input