EnsWilde is a tool utilizing itunesstored & bookassetd exploits, designed for iPhone and iPad running the latest iOS Version 26.2b1.
It operates as a standalone on-device application, functioning independently like modern apps. It leverages the sparserestore exploit to write data to files situated outside of the intended restore location.
Warning
DISCLAIMER: I am not responsible if your device enters a bootloop. Use this software with caution. Please back up your data before using!
- Disable call recording notification sound: Turns off the audible alert when call recording starts.
- Change Apple Wallet background image: Customize the background appearance of Wallet passes/cards.
- Edit MobileGestalt file (advanced): Modify MobileGestalt configuration values (for advanced users).
- Change Passcode background: Customize the numeric keypad appearance using the
.passthminterface. - On-device patching (no PC required): Operates as a standalone app after the initial setup.
- More features coming soon: Development is ongoing to introduce additional capabilities.
Step-by-step guide for changing Apple Wallet pass/card backgrounds using EnsWilde:
🔗 https://gist.github.com/YangJiiii/06daf0c2d0fa11002757e501622353ea
Detailed instructions on customizing the passcode keypad background using .passthm:
🔗 https://gist.github.com/YangJiiii/67c6323cf4b7fd8487fcd6e2c8fb4233
EnsWilde uses Impactor to automatically handle pairing.
🔗 https://github.com/khcrysalis/Impactor
- Download and open Impactor on your computer.
- Connect your iPhone or iPad via USB.
- In Impactor, select EnsWilde.
- Click Import.
- Impactor will automatically generate and inject the required pairing data.
No manual export or file transfer is required.
- Download LocaldevVPN from the iOS App Store.
- Enable the VPN inside the app.
- Launch EnsWilde.
Special thanks to the following for their contributions and support:
- Carrot1211: For cheering me on and supporting me during development
- @khanhduytran0: SparseBox
- @Little_34306: Original concept for "Disable Call Recording"
- @SideStore team:
ideviceand C bindings from StikDebug - @JJTech0130:
SparseRestoreand backup exploit - @hanakim3945:
bl_sbxexploit files and writeup - @Lakr233: BBackupp
- @libimobiledevice: Underlying communication libraries
- @PoomSmart: MobileGestalt dump
- @paragonarsi: Apple Wallet Get
- @iTechExpert21: Hide Dynamic Island
