v16-Integrity-Box-HOTFIX-20-08-2025.zip
385.8 KB
v16 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
[RE-UPLOADED] FIXED UNEXPECTED CRASH ON MAGISK ALPHA
changelog-
โข Fixed unexpected delay in action button(script) expectation.
โข Now default target packages will be updated based on TEE status too, instead of forcing leaf certificate hack mode for devices with non broken TEE
โข Disable intro in WebUI by default & added option to re-enable it in WebUI menu.
โข Improved Keybox updater.
โข Optimised installation script.
โข Added more configuration flags
โข Fixed Lsposed logs spoofing failure
โข Replaced simple "echo" outputs with structured logging mechanism for better traceability.
โข Added a consistent logging format including timestamp for each log entry to improve readability and debugging.
โข Implemented log file capturing using "tee -a" to ensure both console visibility and file persistence of logs.
โข Ensured that all network retry attempts are logged with clear retry counters for transparency.
โข Improved reliability of network connectivity checks by introducing a maximum retry limit with controlled loop execution.
โข Enhanced error handling by introducing explicit exit codes upon failure conditions for better integration with other scripts.
โข Suppressed unnecessary command outputs to keep logs clean and focused only on meaningful information.
โข Introduced graceful exit after maximum retry attempts to avoid indefinite loops in case of no internet connectivity.
โข Standardized indentation, spacing, and code structure for improved readability and maintainability.
โข Consolidated redundant command sequences to simplify the flow and reduce script overhead.
โข Improved user feedback by ensuring retry attempts and failure messages are displayed consistently.
โข Added robust handling of slow or unstable network scenarios to minimize false negatives.
โข Ensured compatibility with BusyBox environment by using portable shell syntax.
โข Improved overall script maintainability by reducing noise and making error handling self-explanatory.
โข Strengthened integration readiness by introducing reliable log capturing that can be parsed or shared easily.
โข Ensured that no sensitive data or unnecessary verbose output is written into the log files.
โข Refined exit behavior to prevent accidental continuation of dependent operations in case of failure.
โข Improved script resilience under low-resource or high-latency conditions.
โข General code cleanup to maintain long-term stability.
โข Custom fonts will be added in next update (got no time to find fonts).
โข Logs will be zipped automatically, if you face any issue, just send me the log zip file
SHA256: 11e8360bbcc7745276c734c7d4fb86c6dc5be42922a570dbdbd7c79bee0806e3
Module Features
Pre-Requirements
Preview
Support
โค172๐29๐ฅ25๐ฟ11๐9๐ซก9๐5๐2๐2๐2๐พ2
Introducing Swipe to Screenshotโญ
This module lets you take screenshots using three-finger tap or swipe gestures on any rooted Android device. It works by tracking touch input directly, so it doesnโt need Accessibility permissions or screen overlays. This makes it fast, accurate, and easy to use.
This module can be especially helpful for those with broken volume or power buttons, or for ROMs like LineageOS and stock ROMs that donโt support three-finger screenshot gestures natively.
๐ฑ https://github.com/MeowDump/Three-Finger-Screenshot
This module lets you take screenshots using three-finger tap or swipe gestures on any rooted Android device. It works by tracking touch input directly, so it doesnโt need Accessibility permissions or screen overlays. This makes it fast, accurate, and easy to use.
This module can be especially helpful for those with broken volume or power buttons, or for ROMs like LineageOS and stock ROMs that donโt support three-finger screenshot gestures natively.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค115๐17๐ฅ12๐ฟ10๐6๐5๐4๐ซก3๐1๐1๐พ1
v1-Three-Finger-Screenshot-23-08-2025.zip
57.1 KB
โค92๐ซก16๐8๐ฟ8๐5๐พ3๐ฅ2๐2๐2๐1
let's revive some outdated modules.
changelog-
expect a new update in few minutes
changelog-
โข Replaced Key Checker with Flag Checker
โข Merged WebUI scripts & Action script in one script
โข Redesigned WebUI with card based UI
โข Improved live terminal logging
โข Whitelisted Pixel Launcher components
โข Fixed WebUI compatibility with MMRL
โข Dropped meow helper activity dependency for popups
expect a new update in few minutes
โค62๐ฅ11๐ฟ6๐2โคโ๐ฅ1๐1
v3-AntiBloat-AOSP-26-08-2025.zip
35.7 KB
v3 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
A little context about this module for new subscribers in this channel:
i collected more than 70 apps from different aosp roms (vanilla & gapps builds). they keep running in background but the strange part is freezing/disabling them doesnโt affect stability or user experience. the number keeps growing with every android update. and no, itโs not just google apps. even pure vanilla without gapps has a lot of crap. the main goal of this module is to freeze these apps to extend battery life & improve performance.
SHA256: 67c5d364882bd3489249d833e2e5e67ca00418350e4d94ddd0eb3940b30cb2e5
changelog
1โค130โก9๐8๐ฅ5๐ฟ5๐5๐3๐จโ๐ป1
๐ ๐๐ข๐ช๐ป๐ฎ ๐
v16-Integrity-Box-HOTFIX-20-08-2025.zip
Please update it by clicking on action button
Please open Telegram to view this post
VIEW IN TELEGRAM
8โค196๐ซก55๐ฟ14๐ฑ10๐8โคโ๐ฅ5๐ฅ5๐4๐3๐พ3๐1
Media is too big
VIEW IN TELEGRAM
Note: Don't enable Spoof Provider if you want to use Google Wallet๐ฑ
Please open Telegram to view this post
VIEW IN TELEGRAM
2โค143๐ฟ26๐14๐ซก14๐9๐3๐3๐2๐2โคโ๐ฅ1๐พ1
v3-Quiet-Kill-30-08-2025.zip
39.6 KB
v3 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
MODULE INFO:
Just press the power button to lock your device this will instantly kill all apps running in the background and foreground.
Want to whitelist an app so it doesn't get killed?
Just copy its package name and paste it into the Ignore List block in the WebUI.
To disable/re-enable the "power key kill" feature, simply click the Action button in the module.
## Changelog
### Power-key listener (quick tap)
โข Added low-CPU event reader using/dev/input/event0with raw power key codes (DOWN/UP).
โข Added fallback polling loop usinggetevent -lqc1with 0.2s interval and 4s timeout.
โข Added timestamped logging to/data/adb/modules/QuiteKill/logs/kill.logand ensured log dir creation.
โข Added float diff withbcwhen available, falls back toawk.
โข Auto-selects event source: usesevent0if readable, otherwise falls back to polling.
โข Preserved thresholds:CLICK_THRESHOLD=0.3,COOLDOWN=5.
โข Removed popup UI integration. Replaced on-screen toasts with log entries.
โข Removedpopup()and am start... meow.helper.MainActivity.
โข Reduced CPU usage by eliminating tight loops andseq-based polling.
### Kill engine (QuiteKill.sh)
โข Log file path changed from$MODDIR/webroot/output.logto$MODDIR/logs/output.log.
โข Ignore list and ForceKill list parsing unchanged.
โข Behavior unchanged: kills all user apps, kills only listed system apps.
### Web UI (index.html)
โข Switched to Material Icons and Material Symbols. Added customMonafont.
โข New snackbar notifications (success, error, info). Replacedalert().
โข Added ripple effects and proper loading states for action buttons.
โข Terminal panel upgrades:
โข Auto-scroll toggle
โข Live killed and skipped counters
โข Log filter search
โข Copy log
โข Export log
โข Clear log
โข Export now writes to/sdcard/kill-control-log.txt.
โข Input sanitization for package names when adding to lists.
โข Theme improvements: new palette, shadows, larger radii, prefers-color-scheme support, persistent choice.
โข Updated log source path to$MODDIR/logs/output.logto match backend.
โข UI layout and list items refined. Truncates long package names with ellipsis.
โข Removed emoji-only section headers and the old minimal log-controls row.
### Removals and structure cleanup
โข Removed dependency on the popup helper app.
โข Removedwebrootas a log target. All logs standardized under$MODDIR/logs/.
โข Removed legacy alert-based messaging.
### Impact
โข Lower CPU usage and more reliable power key detection.
โข Unified logging across backend and UI.
โข Better UX with actionable log tools and clear status feedback
SHA256: 55e2af925026d7d9e914d47f68eb2027d04c6e40c2da50bdabd2e0960586a68b
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค85๐ฟ13โก10๐9๐ฅ6๐3๐1๐1
I Need to Talk About Something Serious (Magisk & KSU Vulnerability)
Iโm creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Iโve never reported a sensitive vulnerability before, and honestly, Iโm not sure how to do it right. Thatโs why I need your help and advice
Letโs keep the group free from drama and behave like adults. Thanks for understanding!
Iโm creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Please keep the group respectful and focused. Each member can post only one message every 1 hours, so think carefully before you send it (you can always edit your message later).
Iโve never reported a sensitive vulnerability before, and honestly, Iโm not sure how to do it right. Thatโs why I need your help and advice
Letโs keep the group free from drama and behave like adults. Thanks for understanding!
โค77๐20๐ฟ18๐ฅ4๐4โคโ๐ฅ1๐1๐ฏ1
I Need to Talk About Something Serious (KernelSU-Magisk Vulnerability)
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And itโs very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I donโt want to give too many hints, but honestly, this is more dangerous than any exploit Iโve seen so far.
At the time, I didnโt report it because itโs shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. Iโve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
Iโm genuinely worried about this. I donโt want to be the reason something bad happens, but I also donโt want to stay silent if the damage is still possible
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
~ Regards @MeowDump
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And itโs very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I donโt want to give too many hints, but honestly, this is more dangerous than any exploit Iโve seen so far.
At the time, I didnโt report it because itโs shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. Iโve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
Iโm genuinely worried about this. I donโt want to be the reason something bad happens, but I also donโt want to stay silent if the damage is still possible
Now Iโm stuck and really need your advice:
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
Also, please donโt DM me asking what the vulnerability is๐ฌ If I felt it was safe to share, I wouldโve already. Thanks for understanding.
~ Regards @MeowDump
10โค123๐ซก43๐21๐ฟ9๐6๐3๐2๐2๐พ2๐ฅ1๐ฏ1
Which of the following approaches would you recommend? (Multiple selections allowed)
Anonymous Poll
33%
Create an public issue on Magisk/KSU repo
65%
Report it to Magisk/KSU devs via email/dm (privately)
25%
Make people aware how it works
6%
Don't do anything, let it happen
2๐78๐ซก24โค13๐ฟ11๐9๐ฑ8๐ฅ3๐2
i got a response, and it turns out ๐ซ KSU and ๐ญ Magisk canโt prevent this issue.
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. Iโm sharing a screen recording, watch it carefully and share it with someone who's device is rooted
(I already knew this, thatโs why I made the poll. If I had dropped the awareness directly, many wouldโve just blamed me or said Iโm promoting it๐ )
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. Iโm sharing a screen recording, watch it carefully and share it with someone who's device is rooted
Please open Telegram to view this post
VIEW IN TELEGRAM
๐94โค36๐ฟ21๐ฑ8๐ซก4๐จโ๐ป2๐1๐1
Media is too big
VIEW IN TELEGRAM
Not everything labeled โopen sourceโ is actually safe, and not everything on GitHub is what it looks like. Donโt blindly trust random Magisk modules floating around, stick to trusted sources.
At the end of the day, your device and your data are your responsibility.
๐ฑ ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
At the end of the day, your device and your data are your responsibility.
Please open Telegram to view this post
VIEW IN TELEGRAM
2๐ฟ182โค106๐ซก51๐ฅ24๐18๐13๐ฑ12๐ป12๐4๐4๐2
๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
Built specially for non root users
Please open Telegram to view this post
VIEW IN TELEGRAM
โค84๐ฟ19๐ฅ14๐12๐9๐ฅฐ2๐ฑ2๐พ2๐1
HMA_Meow.json
94.2 KB
Import this file in HMAL / HMA
last updated on 01 January 2026
2โค146๐20๐ฟ10๐7๐ฅ7๐5๐ฑ4๐ป4๐ซก3
v17.1-Integrity-Box-07-09-2025.zip
388.5 KB
v17.1 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
Changelog v17.1
โข Fixed โoperation not permittedโ error during installation.
โข Removed self-destruct mode.
โข Fixed Hide PIF Detection button not working.
โข Cleaned up unnecessary code.
โข Changed module ID.
โข Fixed module description not updating for Magisk users.
โข Fixed action summary result bug.
โข Improved PIF fork spoofing script
โข Removed anti-tampering detection, (Itโs not stable yet and needs a lot more testing and fine-tuning. I donโt have enough time to keep it in right now. Maybe in the future when I get the chance, it will come back in a better form)
Changelog v17
โข Updated Keybox
โข Cleaned debug fingerprint by default
โข Introduced Anti Tampering Protection
โข Introduced Self Destruct mode
โข Added SHA512+SHA256+MD5 hash with salt verification on install
โข Fixed banned kernel false positive indicator
โข Create NoLineageProp flag in /data/adb/BoxโขBrain to clean LineageOS props
โข Added verification summary on install
โข Added spoofVendingSdk support for PifFork spoofing [WEBUI]
โข Fixed delay handler for KSU [ACTION]
โข Fixed TS patch button not working [WEBUI]
โข Dropped target.txt auto update on boot
โข Dropped modal auto close switch [WEBUI]
โข Introduced hide/unhide extra features button in WebUI
โข Fixed target & keybox backup restore bug on uninstall
โข Updated supporter list [WEBUI]
โข Description will now refresh on boot instead of action
SHA256: 036bd5a6fbeed246a174a23362b53c6906dbca0aa07c43aad8fecbc0321998aaModule Features
Pre-Requirements
Preview
Support
โค117๐ฅ18๐ซก9๐ฟ9๐8๐ฅฐ3๐ค3๐2๐2๐1๐1
v18-Integrity-Box-09-09-2025.zip
404.5 KB
v18 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
โข Added WebUI support for spoofing PifForkโs advanced settings
โข Introduced SELinux spoofer (create /data/adb/Box-Brain/selinux to force spoofing to enforcing)
โข Fixed Hide Pif detection button not working
โข Updated WebUI shortcut icon
โข Updated WebUI-X configuration file with latest changes
โข Dropped legacy PifFork spoof shell script (now handled by WebUI)
โข Fixed WebUI resizing issue when enabling hidden features
โข Added cleanup routine to wipe leftover files on uninstallation
โข Forced ksu-webui as the default WebUI engine
โข Improved installation and upgrade logic for cleaner dirty flashes
โข Optimized script execution speed and reduced unnecessary overhead
โข Enhanced error handling and fail-safe mechanisms
โข Added japanese translation, thanks @ot_inc
โข Improved compatibility with recent Magisk and KernelSU builds
โข Refined logging output for easier debugging
โข Polished UI animations and theme handling
โข Minor code cleanup and refactoring for long-term maintainability
SHA256: 21abc45401234fb9e3cda2a0b1cdf2bb21ab52021319f9e52364435e2afed248Module Features
Pre-Requirements
Support
2โค126๐21๐11๐ฟ8๐ฅ6๐5๐4โคโ๐ฅ2๐1๐จโ๐ป1๐พ1