Look up a tool that matches your iOS version and chip before customizing
Pick an unsandboxed file manager for browsing the iOS root file system
Find a desktop MobileGestalt suite to toggle hidden feature flags
Identify which tools still work on newer Apple chips with PAC and MTE
Each linked tool has its own prerequisites and risk profile, and several only run on older A11 devices.
This repository is not a piece of software. It is a curated directory that lists third-party tools for customizing modern iPhones, specifically devices running iOS 18.x through early iOS 26.x. The maintainer collects projects that fall into several categories: tools that change system settings without a full jailbreak, file managers that get unsandboxed access to the iOS root file system, jailbreak environments for older A11 hardware, and MobileGestalt editors that toggle hidden feature flags. The largest part of the README is a single big table. Each row names a tool, the iOS versions it supports, a short description of what it does and how it does it, and a link to the official GitHub project. Entries include cyanide-ios as a tweak runner, FilzaJailedDS as an unsandboxed file manager, Dopamine as a rootless jailbreak for A11 devices, Accessible as an iOS Shortcut-based file viewer, Lithium as a tool that uses MDM configuration profiles on supervised devices, Pancake Store as an App Store downgrader, Lara as an iOS toolbox using the DarkSword kernel exploit, Nugget as a desktop MobileGestalt suite, SparseBox and SparseBoxPlus as on-device MobileGestalt managers, BlacklistBeGone as a desktop SparseRestore script, Bridge as a system app launcher, dirtyZero as a backup-layer property list injection framework, and Cowabunga Lite as a desktop backup modification manager. A significant chunk of the README is a legal disclaimer. The maintainer states that the repository has no affiliation with any of the listed projects, the people who wrote them, or the wider security research community. The disclaimer also points out that using these tools may violate Apple's Terms of Service, that the maintainer is not responsible for boot loops, data loss, or bricked devices, and that the repository hosts no proprietary binary files, paid enterprise profiles, encryption keys, or modified application bundles. A prerequisites section explains common setup needs across the listed tools. Find My iPhone must be temporarily disabled when doing SparseRestore-style backup modifications. Windows users need the Apple Devices app or iTunes, while macOS and Linux users need pymobiledevice3, usbmuxd, and a Python virtual environment. Lithium specifically needs the iPhone to be in supervised mode through a configuration profile. There is also a note that several of the more invasive exploit chains only work on older A11 hardware because newer Apple chips block them through pointer authentication and memory tagging extensions. A closing trademark notice acknowledges Apple's marks. Overall this is a reference index for the iOS customization scene, written for educational use, not a tool the visitor downloads and runs.
Generated 2026-05-22 · Model: sonnet-4-6 · Verify against the repo before relying on details.