Skip to content

Instantly share code, notes, and snippets.

View scramblr's full-sized avatar
🎯
Focusing

scramblr scramblr

🎯
Focusing
View GitHub Profile
@scramblr
scramblr / an5500-jailbreak.md
Last active December 24, 2025 12:11 — forked from up-n-atom/an5500-jailbreak.md
Axon Networks AN5500 Jailbreak

ℹ️ Last Updated: December 24 2025 by scramblr. Originally put together by UP-N-ATOM who can be found here: up-n-atom's github

ℹ️ The vulnerability & hacking method was originally discussed and confirmed with the help of https://discord.pon.wiki

ℹ️ A document Changelog has been established and can be found at the bottom of this document.

AXON NETWORKS AN5500 (C5500XK) JAILBREAK

This Device Jailbreak Is Accomplished via Rooting The Device with a PRIVILEGE ESCALATION Exploit Found in DHCP.

open -na "Google Chrome Canary" --args --user-data-dir=/Users/dave/.burp-chrome --allow-insecure-localhost --allow-running-insecure-content --disable-add-to-shelf --disable-background-networking --disable-bundled-ppapi-flash --disable-captive-portal-bypass-proxy --disable-clear-browsing-data-counters --disable-client-side-phishing-detection --disable-cloud-import --disable-component-cloud-policy --disable-component-extensions-with-background-pages --disable-component-update --disable-contextual-search --disable-datasaver-prompt --disable-default-apps --disable-device-discovery-notifications --disable-dinosaur-easter-egg --disable-domain-reliability --disable-eol-notification --disable-extensions-http-throttling --disable-http2 --disable-logging --disable-login-animations --disable-network-portal-notification --disable-ntp-popular-sites --disable-offer-upload-credit-cards --disable-office-editing-component-extension --disable-offline-auto-reload --disable-offline-auto-reload-visible-only --disable-password-gen