Fine-tune the SpringBoard dock and home screen grid at runtime: number of icons in the dock, home columns, and home rows. Runtime patch only — no on-disk changes.
Persistence: lives only inside SpringBoard, so it clears on respring/reboot.
Dock icons4
Home columns4
Home rows6
Hide icon labels
Drop the name under every home screen app
Heads up: the grid is patched once during the chain, so moving icons to or from the dock after install can reset some of the layout preferences you set. Respring and rerun if it looks off.
System
MobileGestalt Patchertap for options
Warning: Enabling features your hardware does not support may cause UI glitches, crashes, or in rare cases a bootloop requiring a restore. Only enable features you understand. Uncheck to revert. Use at your own risk.
Powercufftap for options
Underclocks the CPU/GPU for longer battery, at the cost of speed. Port of rpetrich's Powercuff. Lasts until reboot.
Underclocks the CPU/GPU for longer battery, at the cost of speed. Port of rpetrich's Powercuff. Lasts until reboot.
Level
Unstable
3-App Limit Bypass unstabletap for info
Disabled — this bypass proved too unstable on top of the LightSaber chain. Use Lara instead — it's a WIP app that takes advantage of the kernel exploit with a proper reimplementation.
Disabled — this bypass proved too unstable on top of the LightSaber chain.
Use Lara instead. Running the 3-app limit bypass on top of the kernel exploit leaves residual state that makes panics and SpringBoard crashes too frequent to ship. Lara is a WIP app that takes advantage of the kernel exploit with a proper reimplementation and is the recommended replacement.
i
Tip: takes up to 60 seconds. Keep Safari in the foreground while it runs — don't switch apps or lock the device. If it works, don't press your luck.
Expect multiple attempts. This is a kernel exploit chain — it genuinely can take up to 5 tries before it lands. Kill Safari from the app switcher between attempts, reopen, and try again. That's normal.
If it keeps failing: clear Safari's cache (book icon → Clear), reload this page, and retry. If it still won't land after several attempts, reboot the device, clear the cache again, and start fresh.
Not tweak injection — runtime JS modification only
This is JavaScript injection during the exploit chain that modifies processes at runtime. While changes persist until respring or reboot, this is not a standard dylib injection found with a full jailbreak — it is limited in nature and only some things can be done with it.
Compatibility warning — may conflict with Nugget
This may cause compatibility issues with modifications made by Nugget and other similar tools. While I will work on resolving this, keep this in mind in the interim.
Use caution — unstable, not for daily drivers
Derived from the DarkSword exploit chain with all malware communication stripped and fully open source, but this is an inherently unstable chain and is not recommended for deployment on a daily driver unless you are willing to accept the risk. The chain may take several tries to succeed, SpringBoard may crash, the kernel may panic. Use at your own risk — I am not liable for any damage or data loss.
v0.0.97
Activity Log
Waiting to start
Waiting for exploit chain...
Before you continue
Please read the following before using LightSaber.
This is not tweak injection. This is JavaScript injection during the exploit chain that modifies processes at runtime. While changes persist until respring or reboot, this is not a standard dylib injection found with a full jailbreak — it is limited in nature and only some things can be done with it.
Compatibility warning. This may cause compatibility issues with modifications made by Nugget and other similar tools. While I will work on resolving this, keep this in mind in the interim.
Use caution. Derived from the DarkSword exploit chain with all malware communication stripped and fully open source, but this is an inherently unstable chain and is not recommended for deployment on a daily driver unless you are willing to accept the risk. The chain may take several tries to succeed, SpringBoard may crash, the kernel may panic. Use at your own risk — I am not liable for any damage or data loss.
Are you sure?
This will execute kernel-level exploits on your device. Crashes, resprings, and panics are expected. Exercise extreme caution if using on a personal device.
Force-close Safari
Safari is in a dirty state from a previous run. From the app switcher, swipe up on Safari to kill it, then reopen this page and try again.
If this keeps happening, clear Safari's cache (Settings → Apps → Safari → Clear History and Website Data) and/or reboot your device before retrying. A reboot gives you a fresh kernel state and the cleanest chance of success.