โข I've updated this apk as well, so try it if you're having issue with play integrity
โข For seamless experience, use PIF FORK by osm0sis with official Tricky Store
โขSource code will be updated shortly
Source code has been updated ๐
โข For seamless experience, use PIF FORK by osm0sis with official Tricky Store
โข
(I'm too lazy to upload files on GitHub๐ญ)
Source code has been updated ๐
1โค108๐16๐ฟ10๐ฅฐ9๐ฅ7โก5๐5
v15-Integrity-Box-14-08-2025.zip
505.2 KB
v14 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
โข Fixed camera issue
โขAdded new module indicators: ROM sign indicator, Risky apps indicator, Flagged kernel indicator, Playstore version indicator, TEE indicator
โข Introduced configuration to control certain module features
โข Module toggle to switch between blacklist & whitelist modes will be enabled by default for magisk users for shamiko / nohello
โข Debloated unused codes & cleaned up common scripts
โข Added option to disable custom font in WebUI (more fonts will be added in next update)
โข Remote verification can now work without reboot after updating the module
โข Updated 2FA & depreciated forced user to reboot to use keybox function after update
โข Deprecated popup toaster app
โข Deprecated md5 checks
โข Dropped local hash verification file (hashes.txt)
โข Updated uninstall script
moved prop, fingerprint, & aosp keybox to toolbox directory
โข Shipped with pixel 8 fingerprint
โข Updated cleanup script
SHA256: da39f688d27ca99d481ea9fa5bddf6dddcc476d4c4f3ac2e00ab1a8fdfaabc57Module Features
Pre-Requirements
Preview
Support
โค123๐26๐9๐ฅ5๐ซก5๐ฟ5๐3๐1๐พ1
๐ ๐๐ข๐ช๐ป๐ฎ ๐
v15-Integrity-Box-14-08-2025.zip
1โค71๐ฅ9๐ฅฐ4๐ฟ3๐2๐ค2๐1
v16-Integrity-Box-HOTFIX-20-08-2025.zip
385.8 KB
v16 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
[RE-UPLOADED] FIXED UNEXPECTED CRASH ON MAGISK ALPHA
changelog-
โข Fixed unexpected delay in action button(script) expectation.
โข Now default target packages will be updated based on TEE status too, instead of forcing leaf certificate hack mode for devices with non broken TEE
โข Disable intro in WebUI by default & added option to re-enable it in WebUI menu.
โข Improved Keybox updater.
โข Optimised installation script.
โข Added more configuration flags
โข Fixed Lsposed logs spoofing failure
โข Replaced simple "echo" outputs with structured logging mechanism for better traceability.
โข Added a consistent logging format including timestamp for each log entry to improve readability and debugging.
โข Implemented log file capturing using "tee -a" to ensure both console visibility and file persistence of logs.
โข Ensured that all network retry attempts are logged with clear retry counters for transparency.
โข Improved reliability of network connectivity checks by introducing a maximum retry limit with controlled loop execution.
โข Enhanced error handling by introducing explicit exit codes upon failure conditions for better integration with other scripts.
โข Suppressed unnecessary command outputs to keep logs clean and focused only on meaningful information.
โข Introduced graceful exit after maximum retry attempts to avoid indefinite loops in case of no internet connectivity.
โข Standardized indentation, spacing, and code structure for improved readability and maintainability.
โข Consolidated redundant command sequences to simplify the flow and reduce script overhead.
โข Improved user feedback by ensuring retry attempts and failure messages are displayed consistently.
โข Added robust handling of slow or unstable network scenarios to minimize false negatives.
โข Ensured compatibility with BusyBox environment by using portable shell syntax.
โข Improved overall script maintainability by reducing noise and making error handling self-explanatory.
โข Strengthened integration readiness by introducing reliable log capturing that can be parsed or shared easily.
โข Ensured that no sensitive data or unnecessary verbose output is written into the log files.
โข Refined exit behavior to prevent accidental continuation of dependent operations in case of failure.
โข Improved script resilience under low-resource or high-latency conditions.
โข General code cleanup to maintain long-term stability.
โข Custom fonts will be added in next update (got no time to find fonts).
โข Logs will be zipped automatically, if you face any issue, just send me the log zip file
SHA256: 11e8360bbcc7745276c734c7d4fb86c6dc5be42922a570dbdbd7c79bee0806e3
Module Features
Pre-Requirements
Preview
Support
โค172๐29๐ฅ25๐ฟ11๐9๐ซก9๐5๐2๐2๐2๐พ2
Introducing Swipe to Screenshotโญ
This module lets you take screenshots using three-finger tap or swipe gestures on any rooted Android device. It works by tracking touch input directly, so it doesnโt need Accessibility permissions or screen overlays. This makes it fast, accurate, and easy to use.
This module can be especially helpful for those with broken volume or power buttons, or for ROMs like LineageOS and stock ROMs that donโt support three-finger screenshot gestures natively.
๐ฑ https://github.com/MeowDump/Three-Finger-Screenshot
This module lets you take screenshots using three-finger tap or swipe gestures on any rooted Android device. It works by tracking touch input directly, so it doesnโt need Accessibility permissions or screen overlays. This makes it fast, accurate, and easy to use.
This module can be especially helpful for those with broken volume or power buttons, or for ROMs like LineageOS and stock ROMs that donโt support three-finger screenshot gestures natively.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค115๐17๐ฅ12๐ฟ10๐6๐5๐4๐ซก3๐1๐1๐พ1
v1-Three-Finger-Screenshot-23-08-2025.zip
57.1 KB
โค92๐ซก16๐8๐ฟ8๐5๐พ3๐ฅ2๐2๐2๐1
let's revive some outdated modules.
changelog-
expect a new update in few minutes
changelog-
โข Replaced Key Checker with Flag Checker
โข Merged WebUI scripts & Action script in one script
โข Redesigned WebUI with card based UI
โข Improved live terminal logging
โข Whitelisted Pixel Launcher components
โข Fixed WebUI compatibility with MMRL
โข Dropped meow helper activity dependency for popups
expect a new update in few minutes
โค62๐ฅ11๐ฟ6๐2โคโ๐ฅ1๐1
v3-AntiBloat-AOSP-26-08-2025.zip
35.7 KB
v3 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
A little context about this module for new subscribers in this channel:
i collected more than 70 apps from different aosp roms (vanilla & gapps builds). they keep running in background but the strange part is freezing/disabling them doesnโt affect stability or user experience. the number keeps growing with every android update. and no, itโs not just google apps. even pure vanilla without gapps has a lot of crap. the main goal of this module is to freeze these apps to extend battery life & improve performance.
SHA256: 67c5d364882bd3489249d833e2e5e67ca00418350e4d94ddd0eb3940b30cb2e5
changelog
1โค130โก9๐8๐ฅ5๐ฟ5๐5๐3๐จโ๐ป1
๐ ๐๐ข๐ช๐ป๐ฎ ๐
v16-Integrity-Box-HOTFIX-20-08-2025.zip
Please update it by clicking on action button
Please open Telegram to view this post
VIEW IN TELEGRAM
8โค196๐ซก55๐ฟ14๐ฑ10๐8โคโ๐ฅ5๐ฅ5๐4๐3๐พ3๐1
Media is too big
VIEW IN TELEGRAM
Note: Don't enable Spoof Provider if you want to use Google Wallet๐ฑ
Please open Telegram to view this post
VIEW IN TELEGRAM
2โค143๐ฟ26๐14๐ซก14๐9๐3๐3๐2๐2โคโ๐ฅ1๐พ1
v3-Quiet-Kill-30-08-2025.zip
39.6 KB
v3 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
MODULE INFO:
Just press the power button to lock your device this will instantly kill all apps running in the background and foreground.
Want to whitelist an app so it doesn't get killed?
Just copy its package name and paste it into the Ignore List block in the WebUI.
To disable/re-enable the "power key kill" feature, simply click the Action button in the module.
## Changelog
### Power-key listener (quick tap)
โข Added low-CPU event reader using/dev/input/event0with raw power key codes (DOWN/UP).
โข Added fallback polling loop usinggetevent -lqc1with 0.2s interval and 4s timeout.
โข Added timestamped logging to/data/adb/modules/QuiteKill/logs/kill.logand ensured log dir creation.
โข Added float diff withbcwhen available, falls back toawk.
โข Auto-selects event source: usesevent0if readable, otherwise falls back to polling.
โข Preserved thresholds:CLICK_THRESHOLD=0.3,COOLDOWN=5.
โข Removed popup UI integration. Replaced on-screen toasts with log entries.
โข Removedpopup()and am start... meow.helper.MainActivity.
โข Reduced CPU usage by eliminating tight loops andseq-based polling.
### Kill engine (QuiteKill.sh)
โข Log file path changed from$MODDIR/webroot/output.logto$MODDIR/logs/output.log.
โข Ignore list and ForceKill list parsing unchanged.
โข Behavior unchanged: kills all user apps, kills only listed system apps.
### Web UI (index.html)
โข Switched to Material Icons and Material Symbols. Added customMonafont.
โข New snackbar notifications (success, error, info). Replacedalert().
โข Added ripple effects and proper loading states for action buttons.
โข Terminal panel upgrades:
โข Auto-scroll toggle
โข Live killed and skipped counters
โข Log filter search
โข Copy log
โข Export log
โข Clear log
โข Export now writes to/sdcard/kill-control-log.txt.
โข Input sanitization for package names when adding to lists.
โข Theme improvements: new palette, shadows, larger radii, prefers-color-scheme support, persistent choice.
โข Updated log source path to$MODDIR/logs/output.logto match backend.
โข UI layout and list items refined. Truncates long package names with ellipsis.
โข Removed emoji-only section headers and the old minimal log-controls row.
### Removals and structure cleanup
โข Removed dependency on the popup helper app.
โข Removedwebrootas a log target. All logs standardized under$MODDIR/logs/.
โข Removed legacy alert-based messaging.
### Impact
โข Lower CPU usage and more reliable power key detection.
โข Unified logging across backend and UI.
โข Better UX with actionable log tools and clear status feedback
SHA256: 55e2af925026d7d9e914d47f68eb2027d04c6e40c2da50bdabd2e0960586a68b
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค85๐ฟ13โก10๐9๐ฅ6๐3๐1๐1
I Need to Talk About Something Serious (Magisk & KSU Vulnerability)
Iโm creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Iโve never reported a sensitive vulnerability before, and honestly, Iโm not sure how to do it right. Thatโs why I need your help and advice
Letโs keep the group free from drama and behave like adults. Thanks for understanding!
Iโm creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Please keep the group respectful and focused. Each member can post only one message every 1 hours, so think carefully before you send it (you can always edit your message later).
Iโve never reported a sensitive vulnerability before, and honestly, Iโm not sure how to do it right. Thatโs why I need your help and advice
Letโs keep the group free from drama and behave like adults. Thanks for understanding!
โค77๐20๐ฟ18๐ฅ4๐4โคโ๐ฅ1๐1๐ฏ1
I Need to Talk About Something Serious (KernelSU-Magisk Vulnerability)
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And itโs very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I donโt want to give too many hints, but honestly, this is more dangerous than any exploit Iโve seen so far.
At the time, I didnโt report it because itโs shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. Iโve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
Iโm genuinely worried about this. I donโt want to be the reason something bad happens, but I also donโt want to stay silent if the damage is still possible
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
~ Regards @MeowDump
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And itโs very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I donโt want to give too many hints, but honestly, this is more dangerous than any exploit Iโve seen so far.
At the time, I didnโt report it because itโs shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. Iโve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
Iโm genuinely worried about this. I donโt want to be the reason something bad happens, but I also donโt want to stay silent if the damage is still possible
Now Iโm stuck and really need your advice:
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
Also, please donโt DM me asking what the vulnerability is๐ฌ If I felt it was safe to share, I wouldโve already. Thanks for understanding.
~ Regards @MeowDump
10โค123๐ซก43๐21๐ฟ9๐6๐3๐2๐2๐พ2๐ฅ1๐ฏ1
Which of the following approaches would you recommend? (Multiple selections allowed)
Anonymous Poll
33%
Create an public issue on Magisk/KSU repo
65%
Report it to Magisk/KSU devs via email/dm (privately)
25%
Make people aware how it works
6%
Don't do anything, let it happen
2๐78๐ซก24โค13๐ฟ11๐9๐ฑ8๐ฅ3๐2
i got a response, and it turns out ๐ซ KSU and ๐ญ Magisk canโt prevent this issue.
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. Iโm sharing a screen recording, watch it carefully and share it with someone who's device is rooted
(I already knew this, thatโs why I made the poll. If I had dropped the awareness directly, many wouldโve just blamed me or said Iโm promoting it๐ )
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. Iโm sharing a screen recording, watch it carefully and share it with someone who's device is rooted
Please open Telegram to view this post
VIEW IN TELEGRAM
๐94โค36๐ฟ21๐ฑ8๐ซก4๐จโ๐ป2๐1๐1
Media is too big
VIEW IN TELEGRAM
Not everything labeled โopen sourceโ is actually safe, and not everything on GitHub is what it looks like. Donโt blindly trust random Magisk modules floating around, stick to trusted sources.
At the end of the day, your device and your data are your responsibility.
๐ฑ ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
At the end of the day, your device and your data are your responsibility.
Please open Telegram to view this post
VIEW IN TELEGRAM
2๐ฟ182โค106๐ซก51๐ฅ24๐18๐13๐ฑ12๐ป12๐4๐4๐2
๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
Built specially for non root users
Please open Telegram to view this post
VIEW IN TELEGRAM
โค84๐ฟ19๐ฅ14๐12๐9๐ฅฐ2๐ฑ2๐พ2๐1