ONE Jailbreak Ad
Software Updated Apr 08, 2024

Inject jailbreak tweaks into iOS apps with Azule

Promotion image of Azule article.

Adding features to iOS app is possible through various tools designed to inject jailbreak tweaks into restricted apps. While options like Sideloadly offer a straightforward approach, there are also on-device alternatives such as FlekStore, or Esign enabling users to tweak their apps by injecting tweaks seamlessly. Nevertheless, Azule distinguishes itself with an extensive array of features and configuration options.

What is Azule?

Azule is a tool packed with numerous features tailored to inject jailbreak tweaks into decrypted iOS apps, facilitating the sideloading of packages even on non-jailbroken devices. This versatile application is compatible with macOS, and Linux, and can be directly installed on jailbroken iOS devices, offering users seamless access to enhanced functionalities.

Using Azule is a simple process that involves specifying an IPA file and a tweak, with the tool handling the rest seamlessly. This tweak injection solution supports the importation of custom files and folders, including .deb, .dylib, and .framework files, which are processed and injected into the application. Additionally, other files and folders are copied to the root directory of the app, ensuring a smooth integration of tweaks and customizations.

This CLI tool used to inject iOS jailbreak tweaks into jailed iOS apps can handle importing multiple tweaks at once, works with almost every app-targeted tweak, and supports fetching tweaks through Canister and directly from MobileAPT repos. This means you can download and inject tweaks directly from Havoc or Chariz Repos by providing the tweak bundle ID.

Screenshot of Azule app running on macOS terminal app.

In addition to its primary function of injecting tweaks into iOS apps, Azule provides advanced modifier options. These features include the ability to change an app's version, modify its bundle identifier, adjust its display name, apply fakesigning, eliminate app extensions, remove UISupportedDevices from the app, and even strip away Apple Watch support.

Running Azule directly on your jailbroken device unlocks an additional feature. The ability to fetch and decrypt apps directly from the App Store. This convenient functionality provided by ipatool allows users to fetch and decrypt IPA with specified Apple ID.

Furthermore, this Azule for iOS includes an APT Module with the ability to specify custom repos with packages. Additionally, users can filter out packages originating from Canister and exclude those from APT Sources. They also have the option to bypass the installation of package dependencies. Moreover, the module allows users to tailor repository refreshing settings.

With Azule, users have a comprehensive toolkit for injecting jailbreak tweaks into IPA packages with the option to download the latest substrate and substitute hooking libraries. This CLI tool can be also used to automate the process of creating IPA files with the latest version of tweaks.

How to install Azule

On macOS

Step 1. Clone Azule repository from the official GitHub.

git clone ~/Azule

Step 2. Create a symbolic link to execute the Azule from any location in your terminal.

sudo ln -sf ~/Azule/azule /usr/local/bin/azule

On Linux

Step 1. Clone Azule repository from the official GitHub.

git clone ~/Azule

Step 2. Create a symbolic link to execute the Azule from any location in your terminal.

sudo ln -sf ~/Azule/azule /usr/local/bin/azule

On iOS

Step 1. Add the following repositories to your favorite package manager.

Step 2. Download the latest version of Azule for iOS.

Available Commands

Usage: azule [essential arguements] [modifiers]

  azule -n Foo -i -x [email protected] password123 -o ~/Foo/ -f com.alaise.example ~/Foo.bundle -a -m
  azule -n Foo -i ~/Foo.ipa -o ~/Foo/ -f
  azule -n Foo -i ~/Foo.ipa -o ~/Foo/ -f ~/Foo.framework

Essential Arguements:
  -i [Path/BundleID]           Specify the the IPA to patch
  -o [Path]                    Specify an output directory

  -f [Paths/Bundle IDs]        Specify the files or tweak Bundle IDs to import
  -c [Version]                 Set custom version for output ipa
  -b [BundleId]                Set custom BundleID for output ipa
  -p [Name]                    Set custom Display Name for output ipa
  -u                           Remove UISupportedDevices from app
  -S                           Fakesigns iPA for use with AppSync
  -e                           Removes App Extensions

APT Module:
  -A [Source URL/Repo List]    Specify custom sources to get packages from
  -L                           Ignore packages from Canister
  -k                           Ignore packages from APT Sources
  -d                           Don't install package dependencies
  -D                           Disable refreshing Procursus/Elcubratus repos

Decrypt Module:
  -x [Apple ID] [Password]     Fetch and decrypt iPA with specified Apple ID
  -C [Country Code]            Specify country code for ipatool
  -g                           Force Update Apps
  -l                           Don't Update Outdated Apps

  -n [Name]                    Specify a name for the Output iPA
  -y                           Don't remove watch app
  -m                           Don't inject a hooking library
  -R                           Redownload the latest substrate and substitute
  -v                           Enable Verbose Mode
  -s                           Silence Everything But Important Errors
  -w                           Insert dylibs as weak
  -r                           Skip Encryption Check
  -q                           Ignore errors [Discouraged]
  -j                           Allow for Azule to be ran as root [Discouraged]
  -z                           Use Legacy Compression (outputs smaller .ipa files, but runs slower)
  -Z                           Don't compress output .ipa; Output .app
  -h                           Print the help menu
  -H                           Print the complete help menu (incl. unsupported options)

MacOS/Linux Only:
  -U                           Don't Update Azule on run
  -F                           Forcefully update Azule
Author Photo
Written by

Kuba has over 20 years of experience in journalism, focusing on jailbreak topics since 2012. He has interviewed professionals from Intel, Avast, Microsoft, and more. Besides journalism, Kuba specializes in video editing and drone flying. He studied IT at university before his writing career.

Post a comment

Latest Posts


Semaphorin downgrade tool for iOS 7.0.6 – 12.1.2

Semaphorin originated from johndoe123's iOS 7 Tethered Downgrade guide and has evolved into a solution for downgrading A7, A8, A8X, and A9 devices, including iPhone 5s, iPhone 6, iPhone 6s, and iPhone SE (2016) to versions ranging from iOS...


Download i4Tools for Mac, Windows and Linux

Download the latest version of i4Tools for Mac, Windows, and Linux. Install the AsTools Pro App Store on your iPhone, iPad, or iPod Touch for free through the i4Tools Assistant and access apps and games not available at the official App Store...


Wipera1n let's to wipe iDevices without losing the iOS version

Wipera1n is a handy tool for checkm8 that lets you erase your device without having to update to the newest iOS version. This comes in handy if your device won't start up properly or if you want to do a fresh install of your current firmware without...