EXPERIMENTAL — DANGEROUS — DO NOT TRY ON PERSONAL DEVICE.
THIS IS A TEST PAGE FOR UNSTABLE ADJUSTMENTS TO EXPLOIT AND INJECTIONS.
USE https://zeroxjf.github.io/lightsaber/ WHICH IS STABLE
Install "tweaks"

Pick one or more. Selected payloads run together in a single chain execution.

Supported: every arm64e iPhone (A12 – A18 Pro) running iOS 18.4 – 18.6.2.

Dock icons 4
Home columns 4
Home rows 6
Hide icon labels
Drop the name under every home screen app
Heads up: the grid is patched once during the chain, so moving icons to or from the dock after install can reset some of the layout preferences you set. Respring and rerun if it looks off.
Underclocks the CPU/GPU for longer battery, at the cost of speed. Port of rpetrich's Powercuff. Lasts until reboot.
Level
Patches MobileGestalt to set InternalInstall + InternalStorage, enabling the 3-app sideloading bypass. Persists until MobileGestalt cache is regenerated. Same mechanism as Nugget.
Note: Requires respring or reboot to take effect. May conflict with existing Nugget modifications.
i
Tip: takes up to 60 seconds. Keep Safari in the foreground while it runs — don't switch apps or lock the device. If it works, don't press your luck.

If it fails (page flash, "A problem repeatedly occurred", or "webpage crashed" banner): your best bet is to clear Safari's cache and retry — not just kill Safari. Tap the book icon in Safari's bottom tab bar, then Clear, then reload this page. If it still fails after a couple of tries, reboot the device, clear the cache again, and try once more.
Not tweak injection — runtime JS modification only
This is JavaScript injection during the exploit chain that modifies processes at runtime. While changes persist until respring or reboot, this is not a standard dylib injection found with a full jailbreak — it is limited in nature and only some things can be done with it.
Compatibility warning — may conflict with Nugget
This may cause compatibility issues with modifications made by Nugget and other similar tools. While I will work on resolving this, keep this in mind in the interim.
Use caution — unstable, not for daily drivers
Derived from the DarkSword exploit chain with all malware communication stripped and fully open source, but this is an inherently unstable chain and is not recommended for deployment on a daily driver unless you are willing to accept the risk. The chain may take several tries to succeed, SpringBoard may crash, the kernel may panic. Use at your own risk — I am not liable for any damage or data loss.
Thanks to
34306 & khanhduytran0, whose site design helped stabilize payload delivery on this project, @cro4js for UI suggestions, and anonymous contributors for help stabilizing the exploit chain.

v0.0.91

Before you continue

Please read the following before using BrokenBlade.

This is not tweak injection. This is JavaScript injection during the exploit chain that modifies processes at runtime. While changes persist until respring or reboot, this is not a standard dylib injection found with a full jailbreak — it is limited in nature and only some things can be done with it.
Compatibility warning. This may cause compatibility issues with modifications made by Nugget and other similar tools. While I will work on resolving this, keep this in mind in the interim.
Use caution. Derived from the DarkSword exploit chain with all malware communication stripped and fully open source, but this is an inherently unstable chain and is not recommended for deployment on a daily driver unless you are willing to accept the risk. The chain may take several tries to succeed, SpringBoard may crash, the kernel may panic. Use at your own risk — I am not liable for any damage or data loss.

Are you sure?

This will execute kernel-level exploits on your device. Crashes, resprings, and panics are expected. Exercise extreme caution if using on a personal device.

Force-close Safari

Safari got corrupted during a recent failed run. Reusing it can kernel-panic the device. From the app switcher, swipe up on Safari to kill the process, then reopen and try again.