Skip to content

zeroxjf/lightsaber

Repository files navigation

LightSaber

zeroxjf.github.io/lightsaber

iOS 18.4 - 18.6.2 userland exploit chain with JavaScript injection that modifies SpringBoard and other system processes at runtime. Open source, derived from DarkSword with all malware communication stripped.

This is not tweak injection. It is runtime JS modification through an exploit chain. Changes persist until respring or reboot - this is not dylib injection like a full jailbreak.

Supported devices

Every arm64e iPhone (A12 - A18 Pro) running iOS 18.4 - 18.6.2.

Roadmap

To do

  • Improve chain reliability and reproducibility
  • Add offsets to support more iOS 18.x versions
  • Get StatBar functional (data reporting works but UI display hits nonstop PAC violations)
  • Resolve compatibility issues with Nugget and similar tools

Done

  • Full WebContent RCE → kernel R/W → sandbox escape chain
  • SBCustomizer (dock icons, home grid columns/rows, hide labels)
  • Powercuff battery saver (4 throttle levels via thermalmonitord)
  • Multi-tweak picker with single chain execution
  • Support for every arm64e iPhone on iOS 18.4 - 18.6.2
  • #cloutfarmed

How it works

LightSaber chains a WebContent RCE into kernel R/W via sandbox escape, then uses a JSC + objc_msgSend / dlsym native bridge to inject JavaScript into other processes (SpringBoard, mediaplaybackd, thermalmonitord, etc.).

Chain stages

Stage Where What
index.html Safari main page Install card UI, tweak picker, gating
rce_loader.js WebContent iframe URL parser, postMessage routing, exploit bootstrap
rce_worker*.js WebContent worker JavaScriptCore exploit, addrof/fakeobj/read64/write64 primitives
rce_module*.js WebContent worker Heap shaping, PAC gadget signing
sbx0_main_18.4.js WebContent worker Sandbox escape
sbx1_main.js mediaplaybackd Prelude builder, kernel R/W, process injection bridge
pe_main.js mediaplaybackd Payload dispatch, inject*Payload helpers
*_light.js Target processes Tweak payloads (run via the native bridge)

Available tweaks

SBCustomizer

Runtime SpringBoard layout customization: dock icon count, home screen columns and rows, hide icon labels. Patched once during chain execution.

Powercuff

Port of rpetrich's Powercuff. Underclocks CPU/GPU via thermalmonitord for extended battery life. Four levels: nominal, light, moderate, heavy. Lasts until reboot.

Usage

Visit zeroxjf.github.io/lightsaber in Safari on a supported device. Pick your tweaks, tap Install Selected, and keep Safari in the foreground for up to 60 seconds while the chain runs.

If it fails (page flash, "A problem repeatedly occurred", or "webpage crashed" banner): clear Safari's cache (book icon > Clear), reload, and retry. If it keeps failing, reboot, clear cache again, and try once more.

Debugging with syslog.py

syslog.py is a filtered device syslog viewer that shows only chain-relevant log lines. Requires a Mac with idevicesyslog installed (brew install libimobiledevice) and the device connected via USB.

python3 syslog.py

Each run creates a timestamped log file in logs/ (e.g. logs/syslog_2026-04-09_15-37-00.txt). Log tags are color-coded:

  • Green [PE] [PE-DBG] - post-exploit / kernel phase
  • Magenta [SBX1] SBX0 - sandbox escape stages
  • Cyan [SBC] [POWERCUFF] [MG] [APPLIMIT] - tweak payloads
  • Red - crashes, PAC violations, JS errors

See logs/example_successful_run.txt for what a successful chain run looks like.

Project structure

index.html              Main install page (Safari UI)
frame.html              Exploit iframe shell
rce_loader.js           Iframe-side bootstrap + postMessage router
rce_worker.js           WebContent worker (iOS 18.4)
rce_worker_18.6.js      WebContent worker (iOS 18.5-18.6.2)
rce_module.js           Heap shaping module (18.4)
rce_module_18.6.js      Heap shaping module (18.5-18.6.2)
sbx0_main_18.4.js       Sandbox escape
sbx1_main.js            Kernel R/W + process injection bridge
pe_main.js              Payload dispatch in mediaplaybackd
powercuff_light.js      Powercuff payload
sbcustomizer_light.js   SBCustomizer payload
colorbanners_light.js   ColorBanners payload (WIP)
syslog.py               Device syslog capture helper

Credits

License

MIT License. See LICENSE for details.

About

iOS 18.4-18.6.2 userland exploit chain with JS injection into SpringBoard and other processes. Derived from DarkSword.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors