GitDroid
649 subscribers
1.11K photos
12 videos
30 files
1.15K links
Download Telegram
๐ŸŒŸ๐ŸŒŸ Boostify
Boostify is a modern, Xposed module that supercharges WhatsApp with smart extras, adding advanced features and fine-grained customization and privacy. โ€” inspired by WaEnhancer and MdgWa.
It focuses on a clean, preference-first UX, safe guards for power actions, and tools that respect your device.
Android: 8.0+ recommended


๐Ÿ”ฐ Highlights
โ€ข Simple home โ€” the General screen is the main entry point.
โ€ข Fast preference search โ€” toolbar search like WhatsApp Settings.
โ€ข Clean navigation โ€” HomePrivacyMediaCustomizationStatusAboutImport & ExportBackup & Restore.
โ€ข Consistent theming โ€” ActionBar, Status Bar, and Nav Bar adopt your theme; status-bar text auto-contrasts when supported.
โ€ข About screen with project info and links.


โœณ๏ธ Author: wizdom13
โœณ๏ธ Telegram: Channel | Group


๐Ÿ”ฅ GitHub repository   
๐Ÿ”ฅ GitHub releases  
๐Ÿ”ฅ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ“ฃ Join: @gitdroid | @magiskrootport
๐Ÿ“ฃ Join: @mrpstorage
๐Ÿ’ฌ Chat: @mrpdiscussion
Update available
๐ŸŒŸ๐ŸŒŸ OverrideWenku8Reading Background
An Xposed module is used to override the default reading background of the light novel library (org.mewx.wenku8) to white for a better reading experience


โœณ๏ธ Author: Z-Siqi


๐Ÿ”ธ GitHub repository   
๐Ÿ”ธ GitHub releases  
๐Ÿ”ธ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ”… Telegram: @gitdroid | @mrpstorage
๐Ÿ”… GitHub: @magiskrootport
๐ŸŒŸ๐ŸŒŸ Genshin Vulkan Enable
Enabling and disabling Vulkan in Genshin Impact. More controls may be added in the future.


โœณ๏ธ Author: @tryigitx
โœณ๏ธ Telegram: Group


๐Ÿ”ฅ GitHub repository   
๐Ÿ”ฅ GitHub releases  
๐Ÿ”ฅ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ“ฃ Join: @gitdroid | @magiskrootport
๐Ÿ“ฃ Join: @mrpstorage
๐Ÿ’ฌ Chat: @mrpdiscussion
๐ŸŒŸ๐ŸŒŸ TikTok AntiBurn
Remove interface elements from the application using a module or overlapping elements.
to prevent the screen from burning out.


โœณ๏ธ Author: 0mnr0


๐Ÿ”ธ GitHub repository   
๐Ÿ”ธ GitHub releases  
๐Ÿ”ธ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ”… Telegram: @gitdroid | @magiskrootport
๐Ÿ”… GitHub: @magiskrootport
Setup time ๐Ÿ‘‡
๐ŸŒŸ๐ŸŒŸ PlayStoreSelfUpdateBlocker
Blocks Google Play Store self-updates on rooted Android devices. Supports Magisk, APatch, and KernelSU. Useful for users trying to maintain valid device attestation under the newer Play Integrity API rules.


โœ… Compatibility
โ€ข Root Solutions: Magisk 24+, APatch, KernelSU
โ€ข Android: 10+ (report issues if you find any)
โ€ข Devices: All Android devices with supported root methods


โœณ๏ธ Author: himanshujjp


๐Ÿ”ธ GitHub repository   
๐Ÿ”ธ GitHub releases 
๐Ÿ”ธ GitHub actions 
๐Ÿ”ธ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ”… Telegram: @gitdroid | @magiskrootport
๐Ÿ”… GitHub: @magiskrootport
๐ŸŒŸ๐ŸŒŸ disable_usb_debugging
Disables USB Debugging after every reboot


โœณ๏ธ Author: Aakif17


๐Ÿ”ฅ GitHub repository   
๐Ÿ”ฅ GitHub releases  
๐Ÿ”ฅ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ“ฃ Join: @gitdroid | @magiskrootport
๐Ÿ“ฃ Join: @mrpstorage
๐Ÿ’ฌ Chat: @mrpdiscussion
๐ŸŒŸ๐ŸŒŸ MacDroid
A minimal, fast, and colorful CLI to manage and persist custom MAC addresses on Android via Magisk. Includes an interactive TUI (macd) and bootโ€‘time application of a saved MAC.


โœณ๏ธ Author: X-croot


๐Ÿ”ฅ GitHub repository   
๐Ÿ”ฅ GitHub releases  
๐Ÿ”ฅ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ“ฃ Join: @gitdroid | @magiskrootport
๐Ÿ“ฃ Join: @mrpstorage
๐Ÿ’ฌ Chat: @mrpdiscussion
๐ŸŒŸ๐ŸŒŸ PHP7 Webserver
PHP7 Webserver Magisk Modules For CFM.


๐Ÿ”ฐ Features
โ€ข Lock Band SIM1 & SIM2 (band1 & band3)
โ€ข ExtSDCard Explorer
โ€ข Fixed OCGen url
โ€ข Zashboard
โ€ข Free and Premium VPN Menu


โœณ๏ธ Author: budijoi


๐Ÿ”ฅ GitHub repository   
๐Ÿ”ฅ GitHub releases  
๐Ÿ”ฅ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ“ฃ Join: @gitdroid | @magiskrootport
๐Ÿ“ฃ Join: @mrpstorage
๐Ÿ’ฌ Chat: @mrpdiscussion
๐ŸŒŸ๐ŸŒŸ Install Tinymix Utility
A simple Magisk module that installs tinymix executible

Tinymix is a small system utility, adopted to Android from Linux, which allows to modify advanced system audio settings, otherwise not accessible, via terminal commands. This process is very complicated and requires prior knowledge of shell scripts. Although it can be used by advanced users as it is, via terminal interface, this module is intended to be used along with Tinymix Manager apk for better experience.


๐Ÿ› ๏ธ Requirements:
โ€ข Android 4.1+
โ€ข Apatch (I haven't tested it on anything else)
โ€ข Tested on Pixel 8a Android 15 Stock Rom
โ€ข Output works with Tensor M3, the apk had a couple sections DSP and R report unsupported.
โ€ข Will work with most Qalcomm processors, not so sure about MTK.


โœณ๏ธ Author: JLukassen


๐Ÿ”ฅ GitHub repository     
๐Ÿ”ฅ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ“ฃ Join: @gitdroid | @magiskrootport
๐Ÿ“ฃ Join: @mrpstorage
๐Ÿ’ฌ Chat: @mrpdiscussion
๐ŸŒŸ๐ŸŒŸ liboemcrypto disabler
Disables liboemcrypto.so on rooted devices to allow DRM-protected content to play (e.g. Netflix, My5, etc.).


โœณ๏ธ Author: ianmacd, modded by hzy132


๐Ÿ”ธ GitHub repository 
๐Ÿ”ธ GitHub releases
๐Ÿ”ธ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ”… Telegram: @gitdroid | @magiskrootport
๐Ÿ”… GitHub: @magiskrootport
๐ŸŒŸ๐ŸŒŸ Disable Logd
Magisk module that disable logd service


โœณ๏ธ Author: Xenoxis, Keinta15


๐Ÿ”ธ GitHub repository 
๐Ÿ”ธ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ”… Telegram: @gitdroid | @magiskrootport
๐Ÿ”… GitHub: @magiskrootport
๐ŸŒŸ๐ŸŒŸ ZDT-D
A Magisk module designed to bypass DPI (Deep Packet Inspection) on the internet. It helps bypass service blocks and throttling for platforms like Discord, YouTube, and others. This module is tailored for users in Russia and comes with preconfigured settings to overcome restrictions.


๐Ÿ”ฐ Key Features
โ€ข Bypass blocks and service throttling
โ€ข User-friendly graphical interface for configuration (not supported on all devices)
โ€ข Automatic download of up-to-date block lists and binaries from trusted repositories


โœณ๏ธ Author: @GAME_OVER_op, Ggover
โœณ๏ธ Telegram: Group


๐Ÿ”ธ GitHub repository 
๐Ÿ”ธ GitHub releases
๐Ÿ”ธ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ”… Telegram: @gitdroid | @mrpstorage
๐Ÿ”… GitHub: @magiskrootport
๐ŸŒŸ๐ŸŒŸ Sudo for Android NDK
Use sudo on Android shell.

Notice
sudo -e <filepath> need to install nano-ndk module.


โœ… Support Root Manager
โ€ข Magisk, KernelSU, Apatch


โœณ๏ธ Author: natsumerinchan


๐Ÿ”ธ GitHub repository 
๐Ÿ”ธ GitHub releases
๐Ÿ”ธ MRP-Storage


๐Ÿ” Bootloop Protection


๐Ÿ”… Telegram: @gitdroid | @magiskrootport
๐Ÿ”… GitHub: @magiskrootport
Nothing Phone 2a Bootloader Exploit Working

A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.

When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.

1. BootROM โ€“ The first code built into the chip. It loads the next part.
2. Preloader โ€“ Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext โ€“ This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) โ€“ Handles secure operations like fingerprint data and encryption.
5. GenieZone โ€“ A MediaTek component that manages access to the secure system.
6. LK / AEE โ€“ Boots the Android operating system and handles crash logging.
7. Linux Kernel โ€“ This is Android. The phone is now fully booted.

This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (seccfg), the Preloader skips verification of the bl2_ext partition, even though bl2_ext is responsible for verifying everything that comes after it. So if bl2_ext it's not verified and can be modified, it compromises the entire secure boot process. The exploit modifies a function called sec_get_vfy_policy() inside bl2_ext, making it always return "0", so an unverified bl2_ext running at EL3 now happily loads unverified images for the rest of the boot chain.

Additionally, the included PoC also spoofs the deviceโ€™s lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.

Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir

Follow
@TechLeaksZone
โค1