s3ra1n banner
Confirmed working — iOS 16.7.10 · iPhone X · Galaxy S3

palera1n reimagined
for ARMv7 Linux

palera1n running on a Samsung Galaxy S3 (ARMv7, 1GB RAM) running postmarketOS. checkm8 hit on the first attempt. Officially "unsupported." Demonstrably works.

Get Started View on GitHub
scroll
ARMv7
Host Architecture
1st try
checkm8 success
16.7.10
iOS Target
2012
Host Device Year
1GB
Host RAM
Process

Three steps.
One very cursed cable.

The full chain: Pixel 4A → SSH → Galaxy S3 (postmarketOS) → USB OTG → iPhone X. Each step documented with real screenshots from a live run.

01
checkm8 · DFU · PongoOS
Exploit fires. First try.

The Galaxy S3's Linux USB host stack is precise enough to hit the checkm8 UaF race condition reliably — something that takes 10–15 retries on x86 palen1x. PongoOS boots and displays the palera1n boot logo on the iPhone screen.

palera1n boot logo on iPhone X
02
KPF · Kernel · PongoOS commands
Kernel loads. iPhone boots.

PongoOS uploads the KPF module, patches the kernel, sets rootdev=md0, and fires bootx. The verbose kernel boot fills the iPhone screen. The S3 terminal shows "Booting Kernel..." and returns to prompt — job done.

Kernel booting on iPhone X
03
Jailbroken · iCloud bypassed
iPhone X. Unlocked.

Fully booted into iOS with rootful palera1n jailbreak active and Broque Ramdisk iCloud bypass persisted via system directory hooks. The Galaxy S3 is now a hardware key — plug in to unlock after every reboot.

iPhone X successfully bypassed
Architecture

The full stack

📱 Pixel 4A SSH client · tmux
SSH over WiFi
🤖 Samsung Galaxy S3 (GT-I9300) postmarketOS · ARMv7 · 1GB RAM
USB OTG · palera1n-linux-armel → usbmuxd → pymobiledevice3
iPhone X (A11) iOS 16.7.10 · checkm8 · rootful palera1n
Compatibility

What works

Feature Status
checkm8 exploit (Checkmate!)✓ Confirmed
PongoOS boot✓ Confirmed
Kernel boot✓ Confirmed
Rootful jailbreak (-f)✓ Confirmed
iCloud bypass (Broque Ramdisk)✓ Confirmed
Rootless jailbreak (-l)✓ Confirmed
--pongo-shell✓ Confirmed
--force-revert? Untested ( should work )
Quick Start

Get running with
the Python CLI

s3ra1n ships as a Python wrapper around the official palera1n v2.2.0 armel binary. Clone the repo, drop the binary, run the script — interactive menu handles everything else.

bash — postmarketOS ARMv7
# 1. Clone the repo
$ git clone https://github.com/noxbitx/s3ra1n && cd s3ra1n

# 2. Download palera1n binary (or use menu option 14)
$ curl -L https://github.com/palera1n/palera1n/releases/download/v2.2.0/palera1n-linux-armel -o ~/palera1n
$ chmod +x ~/palera1n

# 3. Launch the CLI — auto-detects the binary
$ python3 s3ra1n.py

# The menu handles usbmuxd kill automatically before every run.
# First jailbreak: pick option 3 (Setup → Create fakefs)
# Every reboot after: pick option 1 (Jailbreak → Rootful)
s3ra1n v2.2.0 — menu preview
s3ra1n v2.2.0 — Universal ARMv7   palera1n found: /tmp/palera1n-v221-armel
Select an option:
1. Jailbreak               Rootful (-f)
2. Jailbreak               Rootless (-l)
3. Setup                   Create fakefs (-f -B)
5. Boot                    PongoOS shell (--pongo-shell)
12. Tools                   Start usbmuxd only
13. Tools                   Kill usbmuxd only
14. Tools                   Download palera1n binary
11. Danger                  Force revert jailbreak (--force-revert)
s3ra1n
⚠ Charge your iPhone to at least 30% before starting. Battery death during PongoOS boot can corrupt the fakefs partition.