These tools generally target older iPhone models (typically iPhone 6s through iPhone X) that are susceptible to the exploit.
: Tools of this nature are third-party, unofficial, and often flagged by antivirus software as "riskware" or "malware" due to the way they exploit system vulnerabilities.
: Unlike "tethered" versions, an untethered bypass allows the device to reboot without needing to be re-connected to a computer to re-apply the bypass.