AntiDarkSword is an iOS security tweak that hardens vulnerable jailbroken devices against WebKit and iMessage-based exploits (DarkSword & Coruna). It mitigates / spoofs vectors used in 1-click and 0-click attacks while isolating background daemons.
The tweak detects native security restrictions based on the iOS version:
- iOS 16+: Disables the JIT compiler by hooking native WebKit (
lockdownModeEnabled) and ChatKit (isAutoDownloadable) logic gates. - iOS 15.x: Disables the JIT compiler via undocumented WebKit
_WKProcessPoolConfigurationAPIs (JITEnabled), bridging the gap for devices lacking native Lockdown Mode. Includes a strict JavaScript execution kill-switch.
- WebKit Hardening: Forcibly disables the JIT compiler, inline media auto-playback, Picture-in-Picture, WebGL, WebRTC (peer connections), and local file access in targeted
WKWebViewinstances. - iMessage Mitigation: Blocks automatic attachment downloading and previews within IMCore and ChatKit.
- Corellium Honeypot: Spoofs a research environment using low-level file hooks and a dummy background process, causing advanced payloads to abort delivery.
- User Agent Spoofing: Spoofs the
WKWebViewCustom User Agent to bypass fingerprinting. Includes presets for iOS 18.1, Android Chrome, Windows Edge, macOS. - Granular Controls: Assign app-specific mitigation rules.
- Custom Targeting: Manually assign rules to custom bundle IDs or background daemons.
- Global Mitigations: System-wide kill-switches that indiscriminately apply mitigations to all processes, use with extreme caution.
- Zero-Crash Architecture: Web mitigations are isolated from system tasks, preventing hardware DSP deadlocks and memory limit crashes.
- Exploit Kits & Spyware: DarkSword, Coruna, Predator, PWNYOURHOME, Chaos, Operation Triangulation, Hermit.
- iMessage 0-Clicks: BLASTPASS (PassKit attachments).
- CVEs Patched: CVE-2025-43529, CVE-2024-44308, CVE-2022-42856.
- iOS Versions: 15.0 – 17.0
- Architecture: arm64 / arm64e
- Supported Jailbreaks: * Rootless: Dopamine, Palera1n (iOS 15.0 – 16.7.x)
- Roothide: Dopamine Roothide 2
- Rootful: Use AntiDarkSword-rootful
- Dependencies:
mobilesubstrate(orElleKit),preferenceloader,altlist.
Rootless Installation:
- Download the latest
.debfrom the Releases page. - Install via Sileo, Zebra, or Filza.
- Respring.
Roothide Installation:
- Download the
.debfrom the Releases page. - Open the Roothide Patcher app and select the
.debto convert paths. - Install the generated
-roothide.debvia Sileo or Filza. - Respring.
Configure mitigations via the native Settings app.
Warning
Remove protected apps from Roothide's Blacklist / Choicy to ensure the tweak can successfully inject. Level 3 restricts critical background daemons; lower the tier if system instability occurs.
Level 1
├── 🌐 Safari & Safari View Services
│ ├── OS Baseline (JIT/JS Lockdown)
│ └── Spoof User Agent: ON
│
├── 💬 Apple Messages (MobileSMS, ActivityMessages, iMessageAppsViewService)
│ ├── OS Baseline (JIT/JS Lockdown)
│ ├── Disable Media Auto-Play: ON
│ ├── Disable WebGL & WebRTC: ON
│ ├── Disable Local File Access: ON
│ ├── Disable Msg Auto-Download: ON
│ └── Spoof User Agent: OFF
│
└── ✉️ Apple Mail & Other Native Apps
├── OS Baseline (JIT/JS Lockdown)
├── Disable Media Auto-Play: ON (Mail)
├── Disable WebGL & WebRTC: ON (Mail)
├── Disable Local File Access: ON (Mail)
└── Spoof User Agent: OFF
Level 2
├── 📱 All Level 1 Native Apple Apps & Rules
│
├── 🌐 3rd-Party Browsers (Chrome, Firefox, Brave, DuckDuckGo)
│ ├── OS Baseline (JIT/JS Lockdown)
│ └── Spoof User Agent: ON
│
├── 💬 3rd-Party Messaging & Email (WhatsApp, Discord, Signal, Telegram, Gmail, Outlook)
│ ├── OS Baseline (JIT/JS Lockdown)
│ ├── Disable Media Auto-Play: ON
│ ├── Disable WebGL & WebRTC: ON
│ ├── Disable Local File Access: ON
│ └── Spoof User Agent: ON
│
└── 🏦 Social, Finance, & JB Apps (TikTok, Facebook, PayPal, CashApp, Sileo, Zebra, Filza)
├── OS Baseline (JIT/JS Lockdown)
└── Spoof User Agent: ON
Level 3
├── 📱 All Level 1 & Level 2 Apps & Rules
│
├── 🌐 Browsers (Safari, Chrome, Firefox, Brave, DuckDuckGo)
│ ├── Disable WebGL & WebRTC: ON
│ └── Disable Media Auto-Play: ON
│
└── ⚙️ System Daemons (imagent, apsd, identityservicesd)
├── WebKit Mitigations: BYPASSED
└── System Hooking: ON (Disables zero-click payload parsing)
Created by: EolnMsuk / AntiDarkSword
Thanks to: ghh-jb / CorelliumDecoy
Support my work: Venmo