{"id":47720375,"url":"https://github.com/eolnmsuk/antidarksword","last_synced_at":"2026-04-26T22:03:34.651Z","repository":{"id":347756202,"uuid":"1195181165","full_name":"EolnMsuk/AntiDarkSword","owner":"EolnMsuk","description":"A jailbreak tweak / dylib that hardens iOS 13.X - iOS 17.0 devices against WebKit RCE and iMessage zero-click exploits. Blocks JIT, spoofs user agents, isolates system daemons, and deploys a Corellium honeypot to cause advanced payloads to self-abort.","archived":false,"fork":false,"pushed_at":"2026-04-19T15:31:07.000Z","size":11951,"stargazers_count":63,"open_issues_count":1,"forks_count":6,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-04-19T15:38:18.436Z","etag":null,"topics":["antidarksword","coruna","darksword","dopamine","eolnmsuk","exploit","ios","ios-development","ios-security-tool","iphone","jailbreak","javascript","jit","roothide","rootless","security-tools","tweak","tweaks","useragent-parser","webkit"],"latest_commit_sha":null,"homepage":"https://tinyurl.com/JarTip","language":"Logos","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EolnMsuk.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2026-03-29T10:40:57.000Z","updated_at":"2026-04-19T15:31:12.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/EolnMsuk/AntiDarkSword","commit_stats":null,"previous_names":["eolnmsuk/antidarksword"],"tags_count":427,"template":false,"template_full_name":null,"purl":"pkg:github/EolnMsuk/AntiDarkSword","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EolnMsuk%2FAntiDarkSword","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EolnMsuk%2FAntiDarkSword/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EolnMsuk%2FAntiDarkSword/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EolnMsuk%2FAntiDarkSword/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EolnMsuk","download_url":"https://codeload.github.com/EolnMsuk/AntiDarkSword/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EolnMsuk%2FAntiDarkSword/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":32211386,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-24T03:15:14.334Z","status":"ssl_error","status_checked_at":"2026-04-24T03:15:11.608Z","response_time":64,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["antidarksword","coruna","darksword","dopamine","eolnmsuk","exploit","ios","ios-development","ios-security-tool","iphone","jailbreak","javascript","jit","roothide","rootless","security-tools","tweak","tweaks","useragent-parser","webkit"],"created_at":"2026-04-02T19:22:29.287Z","updated_at":"2026-04-24T06:02:32.816Z","avatar_url":"https://github.com/EolnMsuk.png","language":"Logos","readme":"# AntiDarkSword ⚔️ (Rootless / Rootful)\n\nAntiDarkSword is an iOS security tweak that hardens vulnerable jailbroken devices against WebKit and iMessage-based exploits (DarkSword \u0026 Coruna). It mitigates / spoofs vectors used in 1-click and 0-click attacks while isolating background daemons.\n\n[\u003cimg width=\"1249\" height=\"918\" alt=\"readmeORIG\" src=\"https://github.com/user-attachments/assets/2634bd49-f315-4035-a446-3ef48ffdd134\" /\u003e](https://tinyurl.com/AntiDarkSword)\n\n## ✨ Features\n\n* **Just-In-Time:** Disable JIT via `lockdownModeEnabled` + `isAutoDownloadable` or (iOS 15) `_WKProcessPoolConfiguration` + `JITEnabled`).\n* **WebKit Hardening:** Disable media auto-playback, Picture-in-Picture, WebGL, WebRTC, and local file access.\n* **iMessage Mitigation:** Block automatic attachment downloading and previews within IMCore and ChatKit.\n* **Corellium Honeypot:** Spoof a research environment using file hooks and a dummy process, causing advanced payloads to abort.\n* **User Agent Spoofing:** Spoof the WKWebView User Agent iOS to bypass payload fingerprinting.\n* **Granular Controls:** Manually assign custom process / daemon / app-specific mitigation rules. \n* **Global Mitigations:** System-wide controls that indiscriminately apply mitigations to all processes, use with extreme caution.\n\n## 🛑 Mitigated Exploits\n\n* **Exploit Kits \u0026 Spyware:** DarkSword, Coruna, Predator, PWNYOURHOME, Chaos, Operation Triangulation, Hermit.\n* **iMessage 0-Clicks:** BLASTPASS (PassKit attachments).\n* **CVEs Patched:** CVE-2025-43529, CVE-2024-44308, CVE-2022-42856.\n\n## 📱 Dependencies\n\n`mobilesubstrate` (or `ElleKit`), `preferenceloader`, `altlist`\n\n| Jailbreak | Type | Supported iOS |\n|---|---|---|\n| **Dopamine (2)** | Rootless/hide | 15.0 – 16.6.1 |\n| **Palera1n** | Rootless/ful | 15.0 – 17.x |\n| **meowbrek2** | Rootless | 15.0 – 15.8.3 |\n| **NekoJB** | Rootless | 15.0 – 15.8.3 |\n| **XinaA15** | Hybrid | 15.0 – 15.1.1 |\n| **checkra1n** | Rootful | 14.5 – 14.8.1 |\n| **Taurine** | Rootful | 14.5 – 14.8.1 |\n| **unc0ver** | Rootful | 14.5 – 14.8 |\n\n## 🛠️ Installation\n\n**Jailbroken**\n1. Add this Sileo repo: https://f0rd0w.github.io/\n2. Or manually install the [Latest-Release](https://github.com/EolnMsuk/AntiDarkSword/releases) (rootless `arm64.deb`) (rootful `arm.deb`).\n3. Configure your level of protection in Settings \u003e AntiDarkSword \u003e\n\n**TrollStore**\n1. Download [TrollFools](https://github.com/Lessica/TrollFools/releases), install with [TrollStore](https://github.com/opa334/TrollStore/releases)\n2. Download the `AntiDarkSword.dylib` from [Latest-Release](https://github.com/EolnMsuk/AntiDarkSword/releases)\n3. Open TrollFools and select any 3rd party app to inject then select the dylib you just downloaded.\n4. Double tapp with 3 fingers on screen of injected app to show protection toggles.\n\n## ⚙️ Configuration\n\n\u003e [!WARNING]  \n\u003e Remove protected apps from Roothide's Blacklist / Choicy to ensure the tweak can successfully inject.\n\u003e\n\u003e Level 3 restricts system background daemons. Individual daemons can be toggled in Settings \u003e AntiDarkSword \u003e Restrict System Daemons.\n\n```text\nLevel 1\n├── 🌐 Safari \u0026 Safari View Services\n│   ├── OS Baseline (JIT/JS Lockdown)\n│   └── Spoof User Agent: ON\n│\n├── 💬 Apple Messages (MobileSMS, ActivityMessages, iMessageAppsViewService)\n│   ├── OS Baseline (JIT/JS Lockdown)\n│   ├── Disable Media Auto-Play: ON\n│   ├── Disable WebGL \u0026 WebRTC: ON\n│   ├── Disable Local File Access: ON\n│   ├── Disable Msg Auto-Download: ON\n│   └── Spoof User Agent: OFF\n│\n└── ✉️ Apple Mail \u0026 Other Native Apps\n    ├── OS Baseline (JIT/JS Lockdown)\n    ├── Disable Media Auto-Play: ON (Mail)\n    ├── Disable WebGL \u0026 WebRTC: ON (Mail)\n    ├── Disable Local File Access: ON (Mail)\n    └── Spoof User Agent: OFF\n\nLevel 2\n├── 📱 All Level 1 Native Apple Apps \u0026 Rules\n│\n├── 🌐 3rd-Party Browsers (Chrome, Firefox, Brave, DuckDuckGo)\n│   ├── OS Baseline (JIT/JS Lockdown)\n│   └── Spoof User Agent: ON\n│\n├── 💬 3rd-Party Messaging \u0026 Email (WhatsApp, Discord, Signal, Telegram, Gmail, Outlook)\n│   ├── OS Baseline (JIT/JS Lockdown)\n│   ├── Disable Media Auto-Play: ON\n│   ├── Disable WebGL \u0026 WebRTC: ON\n│   ├── Disable Local File Access: ON\n│   └── Spoof User Agent: ON\n│\n└── 🏦 Social, Finance, \u0026 JB Apps (TikTok, Facebook, PayPal, CashApp, Sileo, Zebra, Filza)\n    ├── OS Baseline (JIT/JS Lockdown)\n    └── Spoof User Agent: ON\n\nLevel 3\n├── 📱 All Level 1 \u0026 Level 2 Apps \u0026 Rules\n│\n├── 🌐 Browsers (Safari, Chrome, Firefox, Brave, DuckDuckGo)\n│   ├── Disable WebGL \u0026 WebRTC: ON\n│   └── Disable Media Auto-Play: ON\n│\n└── ⚙️ System Daemons (imagent, apsd, identityservicesd, IMDPersistenceAgent)\n    ├── System Hooking: ON (Disables zero-click payload parsing)\n    ├── Individual daemon switches: Settings \u003e Restrict System Daemons\n    └── Corellium Honeypot: ON (Spoofs research device hardware \u0026 file paths)\n```\n\n-----\n\n## 👨‍💻 Developer\n\nCreated by: [EolnMsuk](https://github.com/EolnMsuk) / [AntiDarkSword](https://github.com/EolnMsuk/AntiDarkSword/) \n\nThanks to: [ghh-jb](https://github.com/ghh-jb) / [CorelliumDecoy](https://github.com/ghh-jb/CorelliumDecoy)\n\nSupport my work: [Venmo](https://venmo.com/user/eolnmsuk)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Feolnmsuk%2Fantidarksword","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Feolnmsuk%2Fantidarksword","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Feolnmsuk%2Fantidarksword/lists"}