This is not tweak injection. This is JavaScript injection during the exploit chain that modifies SpringBoard at runtime. While changes persist until respring or reboot, this is not a standard dylib injection found with a full jailbreak — it is limited in nature and only some things can be done with it.
Test devices recommended. Derived from the DarkSword exploit chain with all C2 stripped and source reviewed. Expect crashes, resprings, and kernel panics. ~60-70% success rate. Use at your own risk.
Install tweaks
Pick one or more. Selected payloads run together in a single chain execution.
Persistence: lives only inside SpringBoard, so it clears on respring/reboot. After install, try dragging a 5th icon into your dock.
How aggressive?
Think of this like a dial between "fast" and "long-lasting". Heavier settings save more battery but apps, scrolling, and games will feel more sluggish. Start on Moderate if you're not sure.
Lasts until you reboot. To pick a different level (or turn it off), fully reboot your iPhone and re-run this page with the new choice.
Takes up to 60 seconds. Don't switch apps or lock the device. If it fails or resprings, reboot and retry. This chain is fragile — if it works, don't press your luck.
Thanks to 34306 & khanhduytran0, whose site design helped stabilize payload delivery on this project, and anonymous contributors for help stabilizing the exploit chain.
v0.0.25
Are you sure?
This will execute kernel-level exploits on your device. Crashes, resprings, and panics are expected. Exercise extreme caution if using on a personal device.
Force-close Safari first
Safari is still in a dirty state from a previous run of the exploit chain. Launching the chain again in this same Safari process can kernel-panic your device.
Do this before trying again:
Swipe up from the bottom of the screen (or double-press Home) to open the app switcher.
Find Safari and swipe its card up and off the top of the screen to force-quit it.
Reopen Safari from the Home Screen and return to this page.