Forwarded from ServerHive Bot 3
ββ
Build Completed for AxionOS on merlinx
User:
Started: 2026-03-23 09:32:16 AM UTC+05:30
Duration:
π Build Stats: 197314/197314 actions
π§ Configuration:
β’ Variant:
β’ Type:
β’ Release:
β’ GMS:
β’ GMS Variant:
User:
doissM oOo #merlinxStarted: 2026-03-23 09:32:16 AM UTC+05:30
Duration:
43 minutes, 54 secondsπ Build Stats: 197314/197314 actions
π§ Configuration:
β’ Variant:
userβ’ Type:
releaseβ’ Release:
bp3aβ’ GMS:
trueβ’ GMS Variant:
coreπ Build Artifact(s) Uploaded:
1. File:axion-2.4-SOLACE-20260323-UNOFFICIAL-GMS-merlinx.zip
Type: ZIP | Size:1.78 GiB
SHA256:55734cbb48ea50c39f80bac8723de039b3ed16f4f5c5409ac1f6493d5710927e
2. File:vbmeta.img
Type: IMG | Size:64 KiB
SHA256:13e661cf4b378f77dbccf3f612b3afffcd4c0d29e957be9da581c95790571dbc
3. File:super_empty.img
Type: IMG | Size:4.48 KiB
SHA256:8887352ab4725dba6426ece7a68da6a7b9c9f38727ab3d6a699074d980248e20
4. File:boot.img
Type: IMG | Size:64 MiB
SHA256:1ae0a11bb680848ac5b5ffcb5a9cd1714b1e9b7f1cba567f040ed2074a5d6e5a
5. File:recovery.img
Type: IMG | Size:64 MiB
SHA256:8269f5bc83421814ed1f6aed4b26c54e87daac2f0bb7d4f8b47c8118efd307cf
π4
Lance users can port system, product, and other files, use vendor from previous build
ServerHive Bot 3
ββ
Build Completed for AxionOS on merlinx User: doissM oOo #merlinx Started: 2026-03-23 09:32:16 AM UTC+05:30 Duration: 43 minutes, 54 seconds π Build Stats: 197314/197314 actions π§ Configuration: β’ Variant: user β’ Type: release β’ Release: bp3a β’ GMS:β¦
This IS a stable test, be free to Tell bug and issues
π₯7
So hereβs the news: R vendor ROMs are currently stalled. Developers are focusing on S vendor ROMs, so donβt expect anything new anytime soon. Please be patient
- ShockWAVE
- ShockWAVE
π±10β€5π₯°1π«‘1
About s kernel:
@EmreDemirn and @Jbub5 He's the lead developer; emre fixed audio and partially the cameras with jbub.
@sshprb He's the creator of the base, And it's helping with that..
@itsaschoolbus extracted the necessary blobs.
And I'm compiling it, it's already initializing, dead IMEI, already fixing it...
@EmreDemirn and @Jbub5 He's the lead developer; emre fixed audio and partially the cameras with jbub.
@sshprb He's the creator of the base, And it's helping with that..
@itsaschoolbus extracted the necessary blobs.
And I'm compiling it, it's already initializing, dead IMEI, already fixing it...
β€13β‘2π₯1π1π«‘1
Forwarded from AP Mods
gboardlite.zip
16.1 MB
V3 Update Gboard Module Online Installer
CHANGELOG:
https://raw.githubusercontent.com/artproducer/gboardlite/main/Changelog.md
CHANGELOG:
https://raw.githubusercontent.com/artproducer/gboardlite/main/Changelog.md
π2
Forwarded from emredemirnbuilds (EmreDemir)
successfully merged 4.14.336 to s vendor kernel
π±5β€2π₯°1
Forwarded from AxionOS - Updates
AxionOS update:
AxionOS 2.5 REVERIE BETA official release!
About the update: blog
For changelogs: Changelog
Thank you for the patronage π€ Happy flashing π«‘
AxionOS 2.5 REVERIE BETA official release!
About the update: blog
For changelogs: Changelog
Thank you for the patronage π€ Happy flashing π«‘
β€15π2π₯°1
ill wait next server, will build axion for lancerlin. Idk How much users should wait, but If want fast, give a coffee
β€9π±4π₯°1
This isn't a leak, but...
BREAKING: Nekogram is secretly sending your phone numbers to the developer
The backdoor is hidden in the http://Extra.java
file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace.
More info about the backdoor: https://github.com/Nekogram/Nekogram/issues/336 (locked by Nekogram devs)
To validate this, we made a PoC: an LSPosed module that replaces the bot ID and username to ours so all requests are going to it. That way, we confirmed that the phone numbers are being collected. Every. Login.
The PoC is available here: https://github.com/RomashkaTea/nekogram-proof-of-logging
BREAKING: Nekogram is secretly sending your phone numbers to the developer
The backdoor is hidden in the http://Extra.java
file, which differs from the template uploaded to the repository. The obfuscated code sends data as an inline request to the @nekonotificationbot, leaving no trace.
More info about the backdoor: https://github.com/Nekogram/Nekogram/issues/336 (locked by Nekogram devs)
To validate this, we made a PoC: an LSPosed module that replaces the bot ID and username to ours so all requests are going to it. That way, we confirmed that the phone numbers are being collected. Every. Login.
The PoC is available here: https://github.com/RomashkaTea/nekogram-proof-of-logging
π±3π€1π«‘1