Forwarded from Roxy Team
Media is too big
VIEW IN TELEGRAM
New Port!?
Poco X7 Pro with Oxygen OS
Poco X7 Pro with Oxygen OS
Clips By @Naka_Haru_rs
Edit By @Naka_Haru_rs
Music: Analog Horror Funk
β€6
π PixelOS Fifteen - UNOFFICIAL
#ROM #A15 #V #Rodin #PixelOS #POS
π¨Flashing steps: click me!
β¬οΈ Download Rom : Sourceforge | Telegram | Vendor Boot
πΌ Screenshoot : Click here
π Changelogs: click me
βοΈKnown issues:
π Notes:
- Discussion : @PocoX7ProIDChat
#ROM #A15 #V #Rodin #PixelOS #POS
π± Device: Poco X7 Pro (rodin)
π€ Developer: @rthedream
βΉοΈ Android Version: Android 15
π Build date: 8/09/2025
π File Size: 2,8GB
π¨Flashing steps: click me!
β¬οΈ Download Rom : Sourceforge | Telegram | Vendor Boot
πΌ Screenshoot : Click here
π Changelogs: click me
βοΈKnown issues:
β’ Audio jumpscares while playing media first time
β’ HTSR
π Notes:
β’ SELinux is enforcing.π€ Thanks to:
β’ GApps build
β’ Signed build
β’ OTA implemented
β’ Make sure u've backup IMEI.
β’ @claxten, @rio113 for helpβοΈ Buy me a coffee!
β’ @MrZ3T4, @Tutup_oli, @Saiful220, @julesovalle for tester
β’ @rthedream for device tree
β’ Ko-fi- Channel : @PocoX7ProID
β’ Dana
β’ Saweria
- Discussion : @PocoX7ProIDChat
π₯5
NessOS
Based on secret rom :3
Added 90hz
Lower resolution option
Fullscreen AOD
Screenshot Device Frame
Small Tweaks
Better camera and perf and battery because of the rom it's based on(secret)
Based on secret rom :3
Added 90hz
Lower resolution option
Fullscreen AOD
Screenshot Device Frame
Small Tweaks
Better camera and perf and battery because of the rom it's based on(secret)
β€4π₯3π1π1
AxionAOSP need testing reply here in message need active one and can grab logs properly if there's problem on it need at
2.0.101.0VOJMIXMDictionary
Ports=gay
Hyper=gay
Google=gay
Ximi=gay
paywall=gay
Gatekeep=gay
Rafi=gay
Akshontol=gay
AI=gay
Ports=gay
Hyper=gay
Google=gay
Ximi=gay
paywall=gay
Gatekeep=gay
Rafi=gay
Akshontol=gay
AI=gay
Always read the full thing.
Many of you have seen this XDA tread and thought, "oh no, there is no rollback in Xiaomi.eu or even Xiaomi!" That's not the case. This is the initial test of xiaomi.eu for our phone when they didn't know there was a region lock, the flashed rom was based on CN, thus resulted in brick.
Xioami.eu removed it from Patreon afterwards but added it back with two different roms for global and CN separately to fix this.
Many of you have seen this XDA tread and thought, "oh no, there is no rollback in Xiaomi.eu or even Xiaomi!" That's not the case. This is the initial test of xiaomi.eu for our phone when they didn't know there was a region lock, the flashed rom was based on CN, thus resulted in brick.
Xioami.eu removed it from Patreon afterwards but added it back with two different roms for global and CN separately to fix this.
β€1
Forwarded from Roxy Team
Media is too big
VIEW IN TELEGRAM
Best BBK Port?
Poco X7 Pro with Color OS!
Clips by: @Naka_Haru_rs
Edit by: @Naka_Haru_rs
Music: MONTAGEM SILICONADE - Slowed
Poco X7 Pro with Color OS!
Clips by: @Naka_Haru_rs
Edit by: @Naka_Haru_rs
Music: MONTAGEM SILICONADE - Slowed
π₯2
IMPORTANT WARNING ATTENTION
A leak targeting users has been detected in the GetApps application, which is a system application in the HyperOS and MIUI systems on Xiaomi, Redmi, and Poco devices. As a result of this leak, two types of software, Malware and Adware, were detected, including the GetApps application. These software programs, which run in the background and suddenly pop up full-screen ads, and also steal personal data in the background, were specifically detected in the βWifiWardenβ application, which is automatically installed for users. If this application is installed on your device, I would like to point out that you are at risk; everything from your photos to your bank details could be stolen. My personal recommendation is to completely uninstall this application and the GetApps application if they are installed. Wishing you a good day.
A leak targeting users has been detected in the GetApps application, which is a system application in the HyperOS and MIUI systems on Xiaomi, Redmi, and Poco devices. As a result of this leak, two types of software, Malware and Adware, were detected, including the GetApps application. These software programs, which run in the background and suddenly pop up full-screen ads, and also steal personal data in the background, were specifically detected in the βWifiWardenβ application, which is automatically installed for users. If this application is installed on your device, I would like to point out that you are at risk; everything from your photos to your bank details could be stolen. My personal recommendation is to completely uninstall this application and the GetApps application if they are installed. Wishing you a good day.
Nothing Phone 2a Bootloader Exploit Working
A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.
When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.
1. BootROM β The first code built into the chip. It loads the next part.
2. Preloader β Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext β This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) β Handles secure operations like fingerprint data and encryption.
5. GenieZone β A MediaTek component that manages access to the secure system.
6. LK / AEE β Boots the Android operating system and handles crash logging.
7. Linux Kernel β This is Android. The phone is now fully booted.
This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (
Additionally, the included PoC also spoofs the deviceβs lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.
Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir
Follow @TechLeaksZone
A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.
When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.
1. BootROM β The first code built into the chip. It loads the next part.
2. Preloader β Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext β This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) β Handles secure operations like fingerprint data and encryption.
5. GenieZone β A MediaTek component that manages access to the secure system.
6. LK / AEE β Boots the Android operating system and handles crash logging.
7. Linux Kernel β This is Android. The phone is now fully booted.
This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (
seccfg), the Preloader skips verification of the bl2_ext partition, even though bl2_ext is responsible for verifying everything that comes after it. So if bl2_ext it's not verified and can be modified, it compromises the entire secure boot process. The exploit modifies a function called sec_get_vfy_policy() inside bl2_ext, making it always return "0", so an unverified bl2_ext running at EL3 now happily loads unverified images for the rest of the boot chain.Additionally, the included PoC also spoofs the deviceβs lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.
Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir
Follow @TechLeaksZone
β€1