You can’t possibly have heard of the MacDirtyCow or kfd exploits for iOS & iPadOS 15.0-16.1.2 and 16.0-16.6 beta 1 respectively without also hearing about the new PureKFD package manager app, which allows users to install add-ons being hosted on repositories made for both the Misaka and Picasso apps.
On Sunday, PureKFD received an important update to version 3.5, which was first announced in the project’s Discord server by lead developer lrdsnow, and as it would appear, this is an update you won’t want to miss. The full change log is as follows:
– Code cleanup
– Added a cursed file explorer
– Added combined respring (basically just a backboard respring)
The change log seems small and unsuspecting enough, so you might be wondering why we touted to be to be such an important update you wouldn’t want to miss…
Well from what we can gather, the previous version 3.4 update broke the app for many users, and version 3.5 appears to fix this. Several commenters in the Discord channel noted that while the previous update didn’t work for them, this one did.
Using the PureKFD package manager app doesn’t require a jailbreak, but you can most certainly use it on a jailbroken device alongside your jailbreak-based package manager app if you want to. PureKFD allows you to browse a massive cache of MacDirtyCow and kfd exploit-compatible add-ons that let you customize your device(s) with or without a jailbreak, assuming they’re running a supported firmware.
The latest update to PureKFD is available on the project’s GitHub page. Upon downloading the .ipa file, you can perma-sign it with TrollStore or sideload it with AltStore or Sideloadly, whichever you prefer.
If you’re not already taking full advantage of the PureKFD package manager app, and you’re able to because you have a MacDirtyCow or kfd exploit-vulnerable device, then we encourage you to learn more about how you can install the app and take full advantage of it in our step-by-step tutorial post.
Have you updated to the latest version of PureKFD yet? Let us know why or why not in the comments section down below.