## Tweets - https://twitter.com/msuiche/status/1591370094160269312 <blockquote class="twitter-tweet"><p lang="en" dir="ltr">I&#39;ve no idea what I&#39;m doing. <a href="https://t.co/F823BXsKQR">https://t.co/F823BXsKQR</a> <a href="https://t.co/wvUV0G20zy">pic.twitter.com/wvUV0G20zy</a></p>&mdash; Matt Suiche (@msuiche) <a href="https://twitter.com/msuiche/status/1591370094160269312?ref_src=twsrc%5Etfw">November 12, 2022</a></blockquote> - https://twitter.com/jeffssh/status/1512163019807240198 <blockquote class="twitter-tweet"><p lang="en" dir="ltr">The code to trigger FORCEDENTRY (CVE-2021-30860) and create the VM described in <a href="https://twitter.com/i41nbeer?ref_src=twsrc%5Etfw">@i41nbeer</a> and <a href="https://twitter.com/5aelo?ref_src=twsrc%5Etfw">@5aelo</a>&#39;s initial blogpost is available here: <a href="https://t.co/QhYgcMse1K">https://t.co/QhYgcMse1K</a>. Not a working exploit, I don&#39;t have the hardware to do x-dev on iOS, this was all done with xpdf on OSX. <a href="https://t.co/SSPLVmWFXE">https://t.co/SSPLVmWFXE</a></p>&mdash; jeff (@jeffssh) <a href="https://twitter.com/jeffssh/status/1512163019807240198?ref_src=twsrc%5Etfw">April 7, 2022</a></blockquote> ## Links - https://github.com/jeffssh/exploits/blob/main/CVE-2021-30860/exploit.py