A simple customization toolbox that utilizes CVE-2025-24203. Supports iOS 16.0 - iOS 18.3.2.
Download • jbdotparty Discord • jbdotparty Website
Note
All file modifications are done in memory. If something goes wrong or you want to revert the tweaks, just force reboot your device. This toolbox, or any toolbox that uses this exploit, cannot write to files. It can only temporaily disable them.
| iOS Version | Support Status |
|---|---|
| iOS 16.0 - iOS 16.7.x | Supported |
| iOS 17.0 - iOS 17.7.5 | Supported |
| iOS 17.7.6+ | Not Supported |
| iOS 18.0 - iOS 18.3.2 | Supported |
| iOS 18.4+ | Not Supported |
You'll have to respring your device for changes to take effect. Click here to learn how.
- Home Screen
- Hide Dock Background
- Clear Folder Backgrounds
- Clear Widget Config BG
- Clear App Library BG (iOS 18 only)
- Clear Library Search BG
- Clear Spotlight Background
- Hide Delete Icon
- Lock Screen
- Clear Passcode Background
- Hide Lock Icon
- Hide Quick Action Icons (iOS 16 & 17 only)
- Disable Large Battery Icon (iOS 18 only)
- Alerts & Overlays
- Clear Notification & Widget BGs
- Blue Notification Shadows
- Clear Touch & Alert Backgrounds
- Hide Home Bar
- Remove Glassy Overlays
- Clear App Switcher BG
- Fonts & Icons
- Enable 𝖧𝖾𝗅𝗏𝖾𝗍𝗂𝖼𝖺 Font
- Disable Emojis
- Hide Ring Animations
- Hide Tethering Graphic
- Control Center
- Clear CC Module Background (iOS 18 only)
- Disable Slider Icons
- Hide WiFi & Bluetooth Icons (iOS 16 & 17 only)
- Hide Player Buttons
- Hide DND Icon
- Disable Screen Mirroring Module (iOS 16 & 17 only)
- Disable Orientation Lock Module (iOS 16 & 17 only)
- Disable Focus Module (iOS 16 & 17 only)
- Sound Effects
- Disable AirDrop Ping
- Disable Charge Sound
- Disable Low Battery Sound
- Disable Payment Sounds
- Disable Dialing Sounds
- Risky Tweaks (enable these in settings, will likely cause you to have to force reboot your device)
- Disable CC Background
- Disable ALL Accent Colors
- Break System Font
- Disable ALL Banners
- Break SpringBoard Labels
- Break System Labels
- Custom Tweaks
- Create your own tweaks by specifying paths that you'd like to zero out. You can remove the ones you've created by holding down on the custom tweak. Go to settings and click "Remove Custom Tweaks" to get rid of them all at once.
- Install RespringApp using your preferred method of sideloading. If you signed RespringApp with PPQ Protection or AltStore/SideStore, enable "Change Respring App Bundle ID" in settings and type in the bundle id of RespringApp. You can find the bundle id in AltStore's/SideStore's "View App IDs" menu or with tools like Antrag.
- In dirtyZero, click the orange "Respring" button.
- Profit 🔥
This method brought to you by @nyaathea. Due to the nature of the method, it is not possible to integrate this directly into the dirtyZero app, hence the seperate IPA. Note that you can also simply click the RespringApp application itself to respring. If the respring button inside of dirtyZero does not work, get the exact Bundle ID of the RespringApp (you probably had PPQ enabled when sideloading), open dirtyZero's settings, and click "Change Respring App BID."
Option 2: Display & Text Size
- Before applying the tweaks, go into Settings > Display & Brightness > Display Zoom
- Pick the option that's opposite of the one you're currently using.
- After, apply the tweaks.
- Go back into Settings > Display & Brightness > Display Zoom
- Pick the option that's opposite of the one you're currently using.
- Skadz for making this app.
- lunginspector for the UI and numerous tweaks.
- Ian Beer of Google Project Zero for discovering and publishing the exploit.