https://github.com/eolnmsuk/antidarksword
A jailbreak tweak / dylib that hardens iOS 13.X - iOS 17.0 devices against WebKit RCE and iMessage zero-click exploits. Blocks JIT, spoofs user agents, isolates system daemons, and deploys a Corellium honeypot to cause advanced payloads to self-abort.
https://github.com/eolnmsuk/antidarksword
antidarksword coruna darksword dopamine eolnmsuk exploit ios ios-development ios-security-tool iphone jailbreak javascript jit roothide rootless security-tools tweak tweaks useragent-parser webkit
Last synced: about 3 hours ago
JSON representation
A jailbreak tweak / dylib that hardens iOS 13.X - iOS 17.0 devices against WebKit RCE and iMessage zero-click exploits. Blocks JIT, spoofs user agents, isolates system daemons, and deploys a Corellium honeypot to cause advanced payloads to self-abort.
- Host: GitHub
- URL: https://github.com/eolnmsuk/antidarksword
- Owner: EolnMsuk
- License: gpl-3.0
- Created: 2026-03-29T10:40:57.000Z (29 days ago)
- Default Branch: main
- Last Pushed: 2026-04-19T15:31:07.000Z (7 days ago)
- Last Synced: 2026-04-19T15:38:18.436Z (7 days ago)
- Topics: antidarksword, coruna, darksword, dopamine, eolnmsuk, exploit, ios, ios-development, ios-security-tool, iphone, jailbreak, javascript, jit, roothide, rootless, security-tools, tweak, tweaks, useragent-parser, webkit
- Language: Logos
- Homepage: https://tinyurl.com/JarTip
- Size: 11.4 MB
- Stars: 63
- Watchers: 0
- Forks: 6
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# AntiDarkSword ⚔️ (Rootless / Rootful)
AntiDarkSword is an iOS security tweak that hardens vulnerable jailbroken devices against WebKit and iMessage-based exploits (DarkSword & Coruna). It mitigates / spoofs vectors used in 1-click and 0-click attacks while isolating background daemons.
[
](https://tinyurl.com/AntiDarkSword)
## ✨ Features
* **Just-In-Time:** Disable JIT via `lockdownModeEnabled` + `isAutoDownloadable` or (iOS 15) `_WKProcessPoolConfiguration` + `JITEnabled`).
* **WebKit Hardening:** Disable media auto-playback, Picture-in-Picture, WebGL, WebRTC, and local file access.
* **iMessage Mitigation:** Block automatic attachment downloading and previews within IMCore and ChatKit.
* **Corellium Honeypot:** Spoof a research environment using file hooks and a dummy process, causing advanced payloads to abort.
* **User Agent Spoofing:** Spoof the WKWebView User Agent iOS to bypass payload fingerprinting.
* **Granular Controls:** Manually assign custom process / daemon / app-specific mitigation rules.
* **Global Mitigations:** System-wide controls that indiscriminately apply mitigations to all processes, use with extreme caution.
## 🛑 Mitigated Exploits
* **Exploit Kits & Spyware:** DarkSword, Coruna, Predator, PWNYOURHOME, Chaos, Operation Triangulation, Hermit.
* **iMessage 0-Clicks:** BLASTPASS (PassKit attachments).
* **CVEs Patched:** CVE-2025-43529, CVE-2024-44308, CVE-2022-42856.
## 📱 Dependencies
`mobilesubstrate` (or `ElleKit`), `preferenceloader`, `altlist`
| Jailbreak | Type | Supported iOS |
|---|---|---|
| **Dopamine (2)** | Rootless/hide | 15.0 – 16.6.1 |
| **Palera1n** | Rootless/ful | 15.0 – 17.x |
| **meowbrek2** | Rootless | 15.0 – 15.8.3 |
| **NekoJB** | Rootless | 15.0 – 15.8.3 |
| **XinaA15** | Hybrid | 15.0 – 15.1.1 |
| **checkra1n** | Rootful | 14.5 – 14.8.1 |
| **Taurine** | Rootful | 14.5 – 14.8.1 |
| **unc0ver** | Rootful | 14.5 – 14.8 |
## 🛠️ Installation
**Jailbroken**
1. Add this Sileo repo: https://f0rd0w.github.io/
2. Or manually install the [Latest-Release](https://github.com/EolnMsuk/AntiDarkSword/releases) (rootless `arm64.deb`) (rootful `arm.deb`).
3. Configure your level of protection in Settings > AntiDarkSword >
**TrollStore**
1. Download [TrollFools](https://github.com/Lessica/TrollFools/releases), install with [TrollStore](https://github.com/opa334/TrollStore/releases)
2. Download the `AntiDarkSword.dylib` from [Latest-Release](https://github.com/EolnMsuk/AntiDarkSword/releases)
3. Open TrollFools and select any 3rd party app to inject then select the dylib you just downloaded.
4. Double tapp with 3 fingers on screen of injected app to show protection toggles.
## ⚙️ Configuration
> [!WARNING]
> Remove protected apps from Roothide's Blacklist / Choicy to ensure the tweak can successfully inject.
>
> Level 3 restricts system background daemons. Individual daemons can be toggled in Settings > AntiDarkSword > Restrict System Daemons.
```text
Level 1
├── 🌐 Safari & Safari View Services
│ ├── OS Baseline (JIT/JS Lockdown)
│ └── Spoof User Agent: ON
│
├── 💬 Apple Messages (MobileSMS, ActivityMessages, iMessageAppsViewService)
│ ├── OS Baseline (JIT/JS Lockdown)
│ ├── Disable Media Auto-Play: ON
│ ├── Disable WebGL & WebRTC: ON
│ ├── Disable Local File Access: ON
│ ├── Disable Msg Auto-Download: ON
│ └── Spoof User Agent: OFF
│
└── ✉️ Apple Mail & Other Native Apps
├── OS Baseline (JIT/JS Lockdown)
├── Disable Media Auto-Play: ON (Mail)
├── Disable WebGL & WebRTC: ON (Mail)
├── Disable Local File Access: ON (Mail)
└── Spoof User Agent: OFF
Level 2
├── 📱 All Level 1 Native Apple Apps & Rules
│
├── 🌐 3rd-Party Browsers (Chrome, Firefox, Brave, DuckDuckGo)
│ ├── OS Baseline (JIT/JS Lockdown)
│ └── Spoof User Agent: ON
│
├── 💬 3rd-Party Messaging & Email (WhatsApp, Discord, Signal, Telegram, Gmail, Outlook)
│ ├── OS Baseline (JIT/JS Lockdown)
│ ├── Disable Media Auto-Play: ON
│ ├── Disable WebGL & WebRTC: ON
│ ├── Disable Local File Access: ON
│ └── Spoof User Agent: ON
│
└── 🏦 Social, Finance, & JB Apps (TikTok, Facebook, PayPal, CashApp, Sileo, Zebra, Filza)
├── OS Baseline (JIT/JS Lockdown)
└── Spoof User Agent: ON
Level 3
├── 📱 All Level 1 & Level 2 Apps & Rules
│
├── 🌐 Browsers (Safari, Chrome, Firefox, Brave, DuckDuckGo)
│ ├── Disable WebGL & WebRTC: ON
│ └── Disable Media Auto-Play: ON
│
└── ⚙️ System Daemons (imagent, apsd, identityservicesd, IMDPersistenceAgent)
├── System Hooking: ON (Disables zero-click payload parsing)
├── Individual daemon switches: Settings > Restrict System Daemons
└── Corellium Honeypot: ON (Spoofs research device hardware & file paths)
```
-----
## 👨💻 Developer
Created by: [EolnMsuk](https://github.com/EolnMsuk) / [AntiDarkSword](https://github.com/EolnMsuk/AntiDarkSword/)
Thanks to: [ghh-jb](https://github.com/ghh-jb) / [CorelliumDecoy](https://github.com/ghh-jb/CorelliumDecoy)
Support my work: [Venmo](https://venmo.com/user/eolnmsuk)