v3-Quiet-Kill-30-08-2025.zip
39.6 KB
v3 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
MODULE INFO:
Just press the power button to lock your device this will instantly kill all apps running in the background and foreground.
Want to whitelist an app so it doesn't get killed?
Just copy its package name and paste it into the Ignore List block in the WebUI.
To disable/re-enable the "power key kill" feature, simply click the Action button in the module.
## Changelog
### Power-key listener (quick tap)
โข Added low-CPU event reader using/dev/input/event0with raw power key codes (DOWN/UP).
โข Added fallback polling loop usinggetevent -lqc1with 0.2s interval and 4s timeout.
โข Added timestamped logging to/data/adb/modules/QuiteKill/logs/kill.logand ensured log dir creation.
โข Added float diff withbcwhen available, falls back toawk.
โข Auto-selects event source: usesevent0if readable, otherwise falls back to polling.
โข Preserved thresholds:CLICK_THRESHOLD=0.3,COOLDOWN=5.
โข Removed popup UI integration. Replaced on-screen toasts with log entries.
โข Removedpopup()and am start... meow.helper.MainActivity.
โข Reduced CPU usage by eliminating tight loops andseq-based polling.
### Kill engine (QuiteKill.sh)
โข Log file path changed from$MODDIR/webroot/output.logto$MODDIR/logs/output.log.
โข Ignore list and ForceKill list parsing unchanged.
โข Behavior unchanged: kills all user apps, kills only listed system apps.
### Web UI (index.html)
โข Switched to Material Icons and Material Symbols. Added customMonafont.
โข New snackbar notifications (success, error, info). Replacedalert().
โข Added ripple effects and proper loading states for action buttons.
โข Terminal panel upgrades:
โข Auto-scroll toggle
โข Live killed and skipped counters
โข Log filter search
โข Copy log
โข Export log
โข Clear log
โข Export now writes to/sdcard/kill-control-log.txt.
โข Input sanitization for package names when adding to lists.
โข Theme improvements: new palette, shadows, larger radii, prefers-color-scheme support, persistent choice.
โข Updated log source path to$MODDIR/logs/output.logto match backend.
โข UI layout and list items refined. Truncates long package names with ellipsis.
โข Removed emoji-only section headers and the old minimal log-controls row.
### Removals and structure cleanup
โข Removed dependency on the popup helper app.
โข Removedwebrootas a log target. All logs standardized under$MODDIR/logs/.
โข Removed legacy alert-based messaging.
### Impact
โข Lower CPU usage and more reliable power key detection.
โข Unified logging across backend and UI.
โข Better UX with actionable log tools and clear status feedback
SHA256: 55e2af925026d7d9e914d47f68eb2027d04c6e40c2da50bdabd2e0960586a68b
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค85๐ฟ13โก10๐9๐ฅ6๐3๐1๐1
I Need to Talk About Something Serious (Magisk & KSU Vulnerability)
Iโm creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Iโve never reported a sensitive vulnerability before, and honestly, Iโm not sure how to do it right. Thatโs why I need your help and advice
Letโs keep the group free from drama and behave like adults. Thanks for understanding!
Iโm creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Please keep the group respectful and focused. Each member can post only one message every 1 hours, so think carefully before you send it (you can always edit your message later).
Iโve never reported a sensitive vulnerability before, and honestly, Iโm not sure how to do it right. Thatโs why I need your help and advice
Letโs keep the group free from drama and behave like adults. Thanks for understanding!
โค77๐20๐ฟ18๐ฅ4๐4โคโ๐ฅ1๐1๐ฏ1
I Need to Talk About Something Serious (KernelSU-Magisk Vulnerability)
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And itโs very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I donโt want to give too many hints, but honestly, this is more dangerous than any exploit Iโve seen so far.
At the time, I didnโt report it because itโs shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. Iโve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
Iโm genuinely worried about this. I donโt want to be the reason something bad happens, but I also donโt want to stay silent if the damage is still possible
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
~ Regards @MeowDump
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And itโs very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I donโt want to give too many hints, but honestly, this is more dangerous than any exploit Iโve seen so far.
At the time, I didnโt report it because itโs shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. Iโve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
Iโm genuinely worried about this. I donโt want to be the reason something bad happens, but I also donโt want to stay silent if the damage is still possible
Now Iโm stuck and really need your advice:
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
Also, please donโt DM me asking what the vulnerability is๐ฌ If I felt it was safe to share, I wouldโve already. Thanks for understanding.
~ Regards @MeowDump
10โค123๐ซก43๐21๐ฟ9๐6๐3๐2๐2๐พ2๐ฅ1๐ฏ1
Which of the following approaches would you recommend? (Multiple selections allowed)
Anonymous Poll
33%
Create an public issue on Magisk/KSU repo
65%
Report it to Magisk/KSU devs via email/dm (privately)
25%
Make people aware how it works
6%
Don't do anything, let it happen
2๐78๐ซก24โค13๐ฟ11๐9๐ฑ8๐ฅ3๐2
i got a response, and it turns out ๐ซ KSU and ๐ญ Magisk canโt prevent this issue.
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. Iโm sharing a screen recording, watch it carefully and share it with someone who's device is rooted
(I already knew this, thatโs why I made the poll. If I had dropped the awareness directly, many wouldโve just blamed me or said Iโm promoting it๐ )
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. Iโm sharing a screen recording, watch it carefully and share it with someone who's device is rooted
Please open Telegram to view this post
VIEW IN TELEGRAM
๐94โค36๐ฟ21๐ฑ8๐ซก4๐จโ๐ป2๐1๐1
Media is too big
VIEW IN TELEGRAM
Not everything labeled โopen sourceโ is actually safe, and not everything on GitHub is what it looks like. Donโt blindly trust random Magisk modules floating around, stick to trusted sources.
At the end of the day, your device and your data are your responsibility.
๐ฑ ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
At the end of the day, your device and your data are your responsibility.
Please open Telegram to view this post
VIEW IN TELEGRAM
2๐ฟ182โค106๐ซก51๐ฅ24๐18๐13๐ฑ12๐ป12๐4๐4๐2
๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
Built specially for non root users
Please open Telegram to view this post
VIEW IN TELEGRAM
โค84๐ฟ19๐ฅ14๐12๐9๐ฅฐ2๐ฑ2๐พ2๐1
HMA_Meow.json
94.2 KB
Import this file in HMAL / HMA
last updated on 01 January 2026
2โค146๐20๐ฟ10๐7๐ฅ7๐5๐ฑ4๐ป4๐ซก3
v17.1-Integrity-Box-07-09-2025.zip
388.5 KB
v17.1 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
Changelog v17.1
โข Fixed โoperation not permittedโ error during installation.
โข Removed self-destruct mode.
โข Fixed Hide PIF Detection button not working.
โข Cleaned up unnecessary code.
โข Changed module ID.
โข Fixed module description not updating for Magisk users.
โข Fixed action summary result bug.
โข Improved PIF fork spoofing script
โข Removed anti-tampering detection, (Itโs not stable yet and needs a lot more testing and fine-tuning. I donโt have enough time to keep it in right now. Maybe in the future when I get the chance, it will come back in a better form)
Changelog v17
โข Updated Keybox
โข Cleaned debug fingerprint by default
โข Introduced Anti Tampering Protection
โข Introduced Self Destruct mode
โข Added SHA512+SHA256+MD5 hash with salt verification on install
โข Fixed banned kernel false positive indicator
โข Create NoLineageProp flag in /data/adb/BoxโขBrain to clean LineageOS props
โข Added verification summary on install
โข Added spoofVendingSdk support for PifFork spoofing [WEBUI]
โข Fixed delay handler for KSU [ACTION]
โข Fixed TS patch button not working [WEBUI]
โข Dropped target.txt auto update on boot
โข Dropped modal auto close switch [WEBUI]
โข Introduced hide/unhide extra features button in WebUI
โข Fixed target & keybox backup restore bug on uninstall
โข Updated supporter list [WEBUI]
โข Description will now refresh on boot instead of action
SHA256: 036bd5a6fbeed246a174a23362b53c6906dbca0aa07c43aad8fecbc0321998aaModule Features
Pre-Requirements
Preview
Support
โค117๐ฅ18๐ซก9๐ฟ9๐8๐ฅฐ3๐ค3๐2๐2๐1๐1
v18-Integrity-Box-09-09-2025.zip
404.5 KB
v18 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
โข Added WebUI support for spoofing PifForkโs advanced settings
โข Introduced SELinux spoofer (create /data/adb/Box-Brain/selinux to force spoofing to enforcing)
โข Fixed Hide Pif detection button not working
โข Updated WebUI shortcut icon
โข Updated WebUI-X configuration file with latest changes
โข Dropped legacy PifFork spoof shell script (now handled by WebUI)
โข Fixed WebUI resizing issue when enabling hidden features
โข Added cleanup routine to wipe leftover files on uninstallation
โข Forced ksu-webui as the default WebUI engine
โข Improved installation and upgrade logic for cleaner dirty flashes
โข Optimized script execution speed and reduced unnecessary overhead
โข Enhanced error handling and fail-safe mechanisms
โข Added japanese translation, thanks @ot_inc
โข Improved compatibility with recent Magisk and KernelSU builds
โข Refined logging output for easier debugging
โข Polished UI animations and theme handling
โข Minor code cleanup and refactoring for long-term maintainability
SHA256: 21abc45401234fb9e3cda2a0b1cdf2bb21ab52021319f9e52364435e2afed248Module Features
Pre-Requirements
Support
2โค126๐21๐11๐ฟ8๐ฅ6๐5๐4โคโ๐ฅ2๐1๐จโ๐ป1๐พ1
v19-Integrity-Box-11-09-2025.zip
430.5 KB
v19 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
โข Added Control Center button in WebUI for easier module customization
โข Spoofing toggles now remember their last configuration
โข Nuked native detector from target.txt (was causing Tricky Store detection)
โข Added popup function in PIF spoofer
โข Module description now updates on action for seamless updates
โข Removed SELinux changer button from WebUI ( selinux spoofer flag cover it )
โข Shipped with Pixel Tablet fingerprint
โข Updated installation & uninstallation scripts
โข Fixed keybox updater error when running from WebUI
โข Dropped support for kitsune mask
โข Updated HMA config
โข Improved overall stability and performance
โข Minor bug fixes and optimizations
โข Refined UI elements for a smoother experience
SHA256: b2ca3696fddf714302e12493f7e24b7857d2c3b46f08da379f31391b62d35b97Please open Telegram to view this post
VIEW IN TELEGRAM
1โค161๐17๐ซก13๐ฟ9๐7๐6๐พ4๐3๐ฅ2๐2๐1
v20-Integrity-Box-19-09-2025.zip
92.6 KB
v20 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
โข Added Playstore auto update disabler
โข Added Spoof debug fingerprint toggle
โข Added Spoof build tag toggle
โข Added Spoof debug build toggle
โข Added repair mode (experimental)
โข Added reset Playstore toggle (enables auto update)
โข Reduced module size by 80%
โข Depreciated add system apps to target list function
โข Depreciated enable/disable intro button
โข Depreciated switch to AOSP keybox button
โข Depreciated enable/disable modal timeout button
โข Depreciated hidded webui function html
โข Depreciated Derpfest spoofing button
โข Depreciated XiaomiEU spoofing button
โข Depreciated HelluvaOS spoofing button
โข Depreciated PixelOS spoofing button
โข Depreciated Derpfest spoofing button
โข Depreciated join telegram channel button
โข Depreciated module info button
โข Depreciated enable inbuilt GMS spoofing button
โข Depreciated banned keybox list button
โข Depreciated Prop detection button
โข Depreciated custom intro font
โข Depreciated aosp keybox.xml
โข Depreciated HMA config.json
โข Depreciated module toggle mode switcher
โข Depreciated background sparkles in webui
โข Depreciated game
โข Depreciated report shell script & merged into webui
โข Depreciated community support shell script & merged into webui
โข Improved flagged apps detection
โข Improved module description updater
โข Improved webui interface
โข Replaced linotte with cocon font
โข Nuked webui border
โข Nuked unused codes
โข Merged anti debug script in late start service
โข Shipped with Pixel 9 fingerprint
SHA256: a93538c8e63efad1cee885c25dad4d412258a144b12bc3057126341174dc9206Please open Telegram to view this post
VIEW IN TELEGRAM
โค165๐ฅ21๐ซก12๐10๐10๐ฟ9๐ฅฐ3๐2๐1๐ป1๐1
Media is too big
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
โค227๐ฅ43๐19๐ฟ19๐พ14๐9๐6๐5๐พ4๐ซก3๐2
Journey from 80MB to 69KB
Didn't realize how fast four months passed when Google killed the old methods and forced keybox, my Integrity Box module was unstable , experimental & incomplete, but I still released it because people needed a fix. Back then it was 80 MB, now itโs just 69 KB๐ Through this project i experimented with a lot of things, I learned about base69, OpenSSL, ROT13, hex, HTML, CSS, JS, and more
I got love, I got hate, and that what proves Iโm actually doing something. Some ๐ฅท๐ฟ's thinks theyโre โmore skilledโ, no doubt they are, but Iโm just doing this as a hobby. It's funny enough that they're comparing them with an advocate๐ญ
Maybe they donโt really hate me, theyโre just jealous that they donโt get the same love and support I do.
I ended up destroying the businesses of many keybox sellers,๐น๐ and the more haters talked about me, the more people discovered my work. Once they used it, they never looked back
You may have noticed we share a lot of common Telegram groups, but you never saw me active anywhere I used to search my name on Telegram just to see who was talking shit about me, laughing at those lifeless beings ๐คฃ๐คฃ I canโt explain how funny that feeling is (telling this cuz i don't have time to this now)
Being hated by idiots is the price you pay for not being one of them๐
I donโt waste time on keyboard warriors, I let my work speak, not my mouth. No time to entertain a bunch of nuts
Thank you for the support, thatโs what really matter
If you have any doubts, just ask instead of believing rumors. My DMs are always open to everyone
~ Mona
Please open Telegram to view this post
VIEW IN TELEGRAM
2โค391๐ฅ53๐ซก38๐ฟ36๐10๐10โก8๐6๐6๐ฅฐ3๐3
v21-Integrity-Box-22-09-2025.zip
69.5 KB
v21 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog-
โข Implemented notice board in module description, you'll get updates of banned keyboxes, news & tips wen u run action
โข Synced accent monet into sub-webui (PIF fork & Flag control)
โข Updated action script
โข Updated WebUI-X config
โข Updated TS boot patch to september 2025
โข Added toggle to update target list on boot
โข Fixed broken translations in WEBUI
โข Fixed invalid button markup by removing broken inline <a> tags with onclick
โข Simplified Translation lable function by trimming unnecessary fallback branches
โข Merged vending shell script into html
โข Merged start shell script into html
โข Merged stop shell script into html
โข Dropped description updater
โข Dropped all description indicators
โข Dropped redundant inline <style> blocks that duplicated existing style.css rule
โข Dropped custom font support from main, PIF spoofer & flag control WEBUI
โข Dropped unused container and wrapper element
โข Dropped redundant modals and popup structure
โข Dropped duplicate or unused style rule
โข Dropped old theme variables that were no longer referenced.
โข Dropped script references to deprecated or deleted file
โข Dropped unused introโขoverlay blocks
โข Dropped unused SCRIPT_POPUPS entries
โข Dropped deprecated attributes and inline style
โข Dropped translation functions that were not invoked.
โข Dropped obsolete animations and keyframe
โข Dropped old utility functions that served no purpose.
โข Dropped unnecessary comments that added clutter.
โข Dropped obsolete buttons, links, and placeholder
โข Dropped unused classes for buttons, cards, and panel
โข Dropped redundant spacing, margins, and layout definition
โข Dropped redundant modalBackdrop reassignments inside open and closeModal function
โข Streamlined folder structure by removing unused file
โข Reduced code redundancy and improved maintainability.
โข Improved readability by deleting experimental code.
โข Ensured only actively used code remains in the project.
Note: update play integrity fork to 14.1
SHA256: 6f84d61d6c45f1903d9906c9d189c8cde9e538d7ba82aa43e1f73708ef76b4cePlease open Telegram to view this post
VIEW IN TELEGRAM
2โค182๐ซก20๐15๐ฅ13๐ฟ13๐8๐4๐3๐2๐1๐1
v22-Integrity-Box-29-09-2025.zip
66.2 KB
v22 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog:
โข Added option to enable/disable pif advanced settings on action from webui (module settings)
โข Disabled fetch fp with advanced settings during installation
โข Disabled keybox lock for seamless fetching
โข Force update pushed, any previous version will no longer work
โข Fixed auto update target list on boot not working
โข Removed playstore auto update disabler leftover code
โข Updated disable inbuilt spoofing related functions & fixed false positive webui indicator
โข fixed internet check function not working during installation
โข Updated keybox updater script
โข Added option to hide TWRP detection
โข Added option to fetch fingerprint on boot (internet is required)
โข Added logging support for inbuilt spoofing related functions
โข Fixed spoof encryption not working when reset lineage props flag was enabled & added a separate toggle to control it
โข Removed boot hash fixer shell script & its dependency on susfs, updated inbuilt fixer
โข Removed PIF inject spoof script as it's webui already handles setting values
โข Added action delay handler for ksu & apatch users
โข Added lineage prop spoofing indicator in webui
โข Dropped unnecessary deletions from cleanup script
โข Fixed module description message not updating after notice update
โข Nuked everything related to keybox from installation script, keybox updater script now handles it
โข Dropped support for susfs
โข Maybe something here & there. This is what i remember ;)
Notes:
1) For those who are using ROM's inbuilt gms spoofing, pls create/data/adb/Box-Brain/gmsfile otherwise itโll disable in-built pixel spoofing. Users who are using the PIF module can ignore this step.
2) v22 will force PIF fork to use default settings, however if you want to use Advanced settings, simply enable the advance toggle from WEBUI & run action button
SHA256: fe74148771aecb29bb347db0a7f0b3d4509a21d50357effea778a88d3e1e7685Please open Telegram to view this post
VIEW IN TELEGRAM
1โค133๐ฅ13๐10๐ซก9๐ฟ8๐5๐2๐ฏ1๐1
This media is not supported in your browser
VIEW IN TELEGRAM
If youโre confused about fixing abnormal boot hash when you donโt even have a boot hash, just watch this video
The issue happens because the boot hash script only runs when the hash file actually contains a value. If the file is empty, the script simply skips it, pretending everything is fine.
To run the script, we just need to write anything inside the hash file via WebUI & Reboot
๐ฟ30โค16๐5๐ฅ3๐3โคโ๐ฅ1
v23-Integrity-Box-03-10-2025.zip
66.9 KB
v23 by ๐ ๐๐ข๐ช๐ป๐ฎ ๐
changelog:
โข Added support to hide persist.sys.gphooks.enable & persist.sys.pphooks.enable detection using HIDE PIF DETECTION button
โข Fixed internet check function not working on installation
โข Deprecated migrate.sh execution (pif fork)
โข Reverted changes related to advanced settings
PIF fork WebUI:
โข Improved auto-apply for toggles (Apply button removed, changes apply instantly).
โข Added backup/restore support for config using custom.pif.json.bak.
โข Added process killing support for both Play Service & Play Store, when restartMode=gms.
โข Added reboot option after saving when restartMode=reboot.
โข Centralized all paths and settings into a CONFIG object.
โข Toggle state now saved as JSON instead of key=value lines.
โข Improved sed regex for safer JSON field replacement.
โข Theme is now stored only in localStorage (no longer written to state file).
โข Popup notifications now batch display for all toggles in one save.
โข Removed Apply button and its functionality.
โข Removed secondary button style (btn.secondary).
โข Removed writing theme state into toggle_state.json.
โข Removed key=value style state file output.
โข Removed old popup CSS block (popup still works with shared styling).
SHA256: e7b204b90623b52d20015ff9c5f95f385cf7a6fb78f4665c33ea5ed61785f483Please open Telegram to view this post
VIEW IN TELEGRAM
โค84๐ฅ18๐ฟ16๐7๐4๐2
Media is too big
VIEW IN TELEGRAM
If youโre passing Basic and Device Integrity but still stuck on Strong Integrity, this tutorial will clear things up
๐คญ WATCH CLOSELY
I'm using Magisk Alpha (30400), inbuilt zygisk enabled with the following modules:
TrickyStore
Shamiko
Play Integrity Fork
Integrity Box
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐90โค83๐ฟ13๐9๐7๐3๐2๐2๐2๐1๐ซก1