Hacker Luca Todesco has finally released a public version of the WebKit exploit i.e. web-based tool for re-activating the iOS 9.2-9.3.3 Pangu jailbreak. The new web-based JailbreakMe exploit resolves the certifications problems for those iOS users who are stuck on the last working Pangu jailbreak for iOS 9.

One of the biggest problems while using the Pangu jailbreak is the need to have a developer certificate for the loader app. And while the community is thankful to the Pangu team for creating the semi-untethered jailbreak, someone needed to address the concerns that it introduces because continually having to repeat the jailbreak process each time the Pangu iOS 9.3.3 jailbreak certificate expires is irritating.

Among other additions to the JailbreakMe tool, Todesco has enabled the Pangu's respring code to use a new version of Pangu 9.3.3 SDK that is coming with the unique freedom of saving on-device SHSH blobs and necessary data to downgrade devices.

The SDK constitutes a tfp0 patch called "host-get-special-port" that will allow a seamless process to downgrade any device with a working SHSH blob.

Todesco says in a statement that an untether for the iOS 9.3.3 Pangu jailbreak is achievable. 

"An untether for 9.3.3 is doable and the main issue is that I don't want to risk fucking devices over."

JailbreakMe WebKit is apparently one part of the Trident or the three zero-day bugs that allowed arbitrary code execution when activated. However, the exploit was patched up in iOS 9.3.5, hence the Todesco's web-exploit works only till iOS 9.3.4, as per IBTimes report.

If you want to install JailbreakME then you should have a 64-bit jailbroken device which is running Pangu 9.2-9.3.3 tool and an internet connection (required for first use).

For downloading this you have to lauch Safari on your iOS device and navigate to the following URL: https://jbme.qwertyoruiop.com. Then you simple have to follow the onscreen instructions.