An open API service indexing awesome lists of open source software.

https://github.com/eolnmsuk/antidarksword

A jailbreak tweak / dylib that hardens iOS 13.X - iOS 17.0 devices against WebKit RCE and iMessage zero-click exploits. Blocks JIT, spoofs user agents, isolates system daemons, and deploys a Corellium honeypot to cause advanced payloads to self-abort.
https://github.com/eolnmsuk/antidarksword

antidarksword coruna darksword dopamine eolnmsuk exploit ios ios-development ios-security-tool iphone jailbreak javascript jit roothide rootless security-tools tweak tweaks useragent-parser webkit

Last synced: about 3 hours ago
JSON representation

A jailbreak tweak / dylib that hardens iOS 13.X - iOS 17.0 devices against WebKit RCE and iMessage zero-click exploits. Blocks JIT, spoofs user agents, isolates system daemons, and deploys a Corellium honeypot to cause advanced payloads to self-abort.

Awesome Lists containing this project

README

          

# AntiDarkSword ⚔️ (Rootless / Rootful)

AntiDarkSword is an iOS security tweak that hardens vulnerable jailbroken devices against WebKit and iMessage-based exploits (DarkSword & Coruna). It mitigates / spoofs vectors used in 1-click and 0-click attacks while isolating background daemons.

[readmeORIG](https://tinyurl.com/AntiDarkSword)

## ✨ Features

* **Just-In-Time:** Disable JIT via `lockdownModeEnabled` + `isAutoDownloadable` or (iOS 15) `_WKProcessPoolConfiguration` + `JITEnabled`).
* **WebKit Hardening:** Disable media auto-playback, Picture-in-Picture, WebGL, WebRTC, and local file access.
* **iMessage Mitigation:** Block automatic attachment downloading and previews within IMCore and ChatKit.
* **Corellium Honeypot:** Spoof a research environment using file hooks and a dummy process, causing advanced payloads to abort.
* **User Agent Spoofing:** Spoof the WKWebView User Agent iOS to bypass payload fingerprinting.
* **Granular Controls:** Manually assign custom process / daemon / app-specific mitigation rules.
* **Global Mitigations:** System-wide controls that indiscriminately apply mitigations to all processes, use with extreme caution.

## 🛑 Mitigated Exploits

* **Exploit Kits & Spyware:** DarkSword, Coruna, Predator, PWNYOURHOME, Chaos, Operation Triangulation, Hermit.
* **iMessage 0-Clicks:** BLASTPASS (PassKit attachments).
* **CVEs Patched:** CVE-2025-43529, CVE-2024-44308, CVE-2022-42856.

## 📱 Dependencies

`mobilesubstrate` (or `ElleKit`), `preferenceloader`, `altlist`

| Jailbreak | Type | Supported iOS |
|---|---|---|
| **Dopamine (2)** | Rootless/hide | 15.0 – 16.6.1 |
| **Palera1n** | Rootless/ful | 15.0 – 17.x |
| **meowbrek2** | Rootless | 15.0 – 15.8.3 |
| **NekoJB** | Rootless | 15.0 – 15.8.3 |
| **XinaA15** | Hybrid | 15.0 – 15.1.1 |
| **checkra1n** | Rootful | 14.5 – 14.8.1 |
| **Taurine** | Rootful | 14.5 – 14.8.1 |
| **unc0ver** | Rootful | 14.5 – 14.8 |

## 🛠️ Installation

**Jailbroken**
1. Add this Sileo repo: https://f0rd0w.github.io/
2. Or manually install the [Latest-Release](https://github.com/EolnMsuk/AntiDarkSword/releases) (rootless `arm64.deb`) (rootful `arm.deb`).
3. Configure your level of protection in Settings > AntiDarkSword >

**TrollStore**
1. Download [TrollFools](https://github.com/Lessica/TrollFools/releases), install with [TrollStore](https://github.com/opa334/TrollStore/releases)
2. Download the `AntiDarkSword.dylib` from [Latest-Release](https://github.com/EolnMsuk/AntiDarkSword/releases)
3. Open TrollFools and select any 3rd party app to inject then select the dylib you just downloaded.
4. Double tapp with 3 fingers on screen of injected app to show protection toggles.

## ⚙️ Configuration

> [!WARNING]
> Remove protected apps from Roothide's Blacklist / Choicy to ensure the tweak can successfully inject.
>
> Level 3 restricts system background daemons. Individual daemons can be toggled in Settings > AntiDarkSword > Restrict System Daemons.

```text
Level 1
├── 🌐 Safari & Safari View Services
│ ├── OS Baseline (JIT/JS Lockdown)
│ └── Spoof User Agent: ON

├── 💬 Apple Messages (MobileSMS, ActivityMessages, iMessageAppsViewService)
│ ├── OS Baseline (JIT/JS Lockdown)
│ ├── Disable Media Auto-Play: ON
│ ├── Disable WebGL & WebRTC: ON
│ ├── Disable Local File Access: ON
│ ├── Disable Msg Auto-Download: ON
│ └── Spoof User Agent: OFF

└── ✉️ Apple Mail & Other Native Apps
├── OS Baseline (JIT/JS Lockdown)
├── Disable Media Auto-Play: ON (Mail)
├── Disable WebGL & WebRTC: ON (Mail)
├── Disable Local File Access: ON (Mail)
└── Spoof User Agent: OFF

Level 2
├── 📱 All Level 1 Native Apple Apps & Rules

├── 🌐 3rd-Party Browsers (Chrome, Firefox, Brave, DuckDuckGo)
│ ├── OS Baseline (JIT/JS Lockdown)
│ └── Spoof User Agent: ON

├── 💬 3rd-Party Messaging & Email (WhatsApp, Discord, Signal, Telegram, Gmail, Outlook)
│ ├── OS Baseline (JIT/JS Lockdown)
│ ├── Disable Media Auto-Play: ON
│ ├── Disable WebGL & WebRTC: ON
│ ├── Disable Local File Access: ON
│ └── Spoof User Agent: ON

└── 🏦 Social, Finance, & JB Apps (TikTok, Facebook, PayPal, CashApp, Sileo, Zebra, Filza)
├── OS Baseline (JIT/JS Lockdown)
└── Spoof User Agent: ON

Level 3
├── 📱 All Level 1 & Level 2 Apps & Rules

├── 🌐 Browsers (Safari, Chrome, Firefox, Brave, DuckDuckGo)
│ ├── Disable WebGL & WebRTC: ON
│ └── Disable Media Auto-Play: ON

└── ⚙️ System Daemons (imagent, apsd, identityservicesd, IMDPersistenceAgent)
├── System Hooking: ON (Disables zero-click payload parsing)
├── Individual daemon switches: Settings > Restrict System Daemons
└── Corellium Honeypot: ON (Spoofs research device hardware & file paths)
```

-----

## 👨‍💻 Developer

Created by: [EolnMsuk](https://github.com/EolnMsuk) / [AntiDarkSword](https://github.com/EolnMsuk/AntiDarkSword/)

Thanks to: [ghh-jb](https://github.com/ghh-jb) / [CorelliumDecoy](https://github.com/ghh-jb/CorelliumDecoy)

Support my work: [Venmo](https://venmo.com/user/eolnmsuk)