Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jjolano/shadow
A jailbreak detection bypass for modern iOS jailbreaks.
https://github.com/jjolano/shadow
ios jailbreak-detection jailbreak-tweak objective-c
Last synced: 1 day ago
JSON representation
A jailbreak detection bypass for modern iOS jailbreaks.
- Host: GitHub
- URL: https://github.com/jjolano/shadow
- Owner: jjolano
- License: bsd-3-clause
- Created: 2019-04-08T21:24:48.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2024-02-21T15:00:27.000Z (9 months ago)
- Last Synced: 2024-08-01T19:53:28.267Z (3 months ago)
- Topics: ios, jailbreak-detection, jailbreak-tweak, objective-c
- Language: Logos
- Homepage: https://ios.jjolano.me
- Size: 983 KB
- Stars: 771
- Watchers: 28
- Forks: 131
- Open Issues: 23
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- Awesome-Pentest - Shadow - A jailbreak detection bypass for modern iOS jailbreaks. (Mobile Security / iOS)
README
# Shadow
A jailbreak detection bypass for modern iOS jailbreaks.
## Known Issues
### XinaA15
* No support is given, but Shadow should still be functional.
### palera1n
* On iOS 16.2+, Substitute appears to have issues hooking C functions. In this case, please use the `fishhook` hooking library or replace Substitute with ElleKit (?).
## Troubleshooting
Shadow is not guaranteed to work on all apps, but here are some ideas to try:
* Use a different hooking library. `fishhook` is a safe option, but is somewhat limited in what it can hook.
* Disable all tweaks except Shadow. You can use Choicy or libhooker Configurator to do this per-app.
* Use vnodebypass, if supported on your system.
* If semi-(un)tethered or rootless, reboot into normal jailed iOS and use the app.
* Use another bypass tweak, ideally an app-specific bypass tweak. Be wary of enabling multiple bypass tweaks in case of conflicts.
* Downgrade the app. Sometimes, newer versions have updated detection methods.## Installation
Add my [repo](https://ios.jjolano.me) to your package manager and install the Shadow (`me.jjolano.shadow`) package. Alternatively, download the [latest release](https://github.com/jjolano/shadow/releases/latest) directly from GitHub and open the file with your package manager.
You may need additional repositories for dependencies - these are the current dependencies:
* `libSandy` from [opa334's Repo](https://opa334.github.io) (preferences - sandboxed loading)
* `AltList` from [opa334‘s Repo](https://opa334.github.io) (preferences - application listing)
* `HookKit Framework` (hooking + change hooking library feature)
* `RootBridge Framework` (rootless compatibility/universal binary building)A recommended (but not required) package is `Injection Foundation` from PoomSmart's Repo (`https://poomsmart.github.io/repo`). This package ensures that Shadow is injected properly into certain apps.
## Usage
After installation, settings are available in the Settings app. You may configure global defaults, or add an app-specific configuration. Shadow allows fine-grained control of its bypass strength, so there will be many options available to configure.
## Legal
*Copyright Act*, RSC 1985, c C-42, s 41.12.