bhideki

bhideki / darksword

Public

Python CLI framework to serve and sync the DarkSword iOS exploit-chain payloads (iOS 18.4–18.7).

15
12
69% credibility
Found Mar 26, 2026 at 15 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
JavaScript
AI Summary

A command-line tool that simplifies delivering the DarkSword iOS exploit chain for authorized red team security testing on iOS 18.4-18.7 devices via a web server.

How It Works

1
🔍 Discover the security testing tool

You hear about a helpful kit for simulating iOS attacks during authorized security checks.

2
📥 Set up on your computer

You easily prepare the tool on your Mac so it's ready for your test scenario.

3
🔄 Grab the test pieces

You update the special files needed for the simulation to make sure everything is fresh.

4
🎨 Make a realistic looking page

You create a simple webpage that looks like a normal site to draw in the test device.

5
🚀 Share the page with test iPhone

You start the demo site and have your test iPhone visit it through Safari – the magic begins invisibly.

6
📱 Watch the test unfold

The iPhone loads the page normally, but behind the scenes, it runs the security challenge steps.

Get your test results

You collect any info from the test and wrap up, ready to write your security report.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 15 to 15 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is darksword?

Darksword is a Python CLI framework using Click for red teamers to serve and sync DarkSword iOS exploit-chain payloads targeting iOS 18.4-18.7 via WebKit RCE and privilege escalation. Run `darksword serve` to spin up an HTTP server, point iOS Safari at it, and deliver the chain automatically—complete with payload syncing from upstream repos, custom C2 host injection, and exfil to a local directory. It solves the hassle of manually hosting zero-click iOS exploits in authorized pentests, unlike scattered darksword github repo forks.

Why is it gaining traction?

It streamlines python cli tool workflows with commands like `darksword sync`, `list`, `info`, and `template generate` for custom landing pages, plus python click options for host/port/C2 tweaks—far simpler than cobbling together servers for darksword armory-style chains. Devs dig the one-stop python cli framework for iOS red teaming, auto-handling version-specific payloads without chasing darksword reddit threads or darkswords variants. No bloat, just practical exfil and fallback redirects.

Who should use this?

Red team operators running authorized iOS pentests on 18.4-18.7 devices, especially those tired of manual payload hosting. Security researchers prototyping WebKit attacks or C2 integrations via simple python cli args. Skip if you're into unrelated stuff like darksword android, darksword miniatures, or darksword mm2 value hunts.

Verdict

Solid beta for niche iOS red team delivery (MIT licensed, good README), but 15 stars and 0.699999988079071% credibility score scream early-stage—test in isolated labs only. Grab it if you need quick python cli library for exploits; otherwise, watch for upstream fixes.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.