No deleted account found from
84 scanned users from this group 🚫👻Forwarded from fatalcoder524
Just a P.S.A. for all SusFS users!
1. SusFS has released sus_maps and we have already kept a version on build. So OnePlus builds with map_spoof will not be continued.
2. The current version of sus_maps doesn't work on mounts made by mountify. So for Mountify users, it might not work. But Simon has provided possible instructions on how you can try in Gitlab. (I have not tried that method to comment on it currently)
3. Sus_maps is a method of hiding memory maps and normally detectors say Found Injection. Adding those paths should fix your detections.
4. Possible stuff you can hide are fonts, drivers, zygisk modules etc..
5. It works only on umounted apps and not system wide. Since it's a powerful feature, it might cause instability if applied globally.
6. Most of you wouldn't even need to use this feature as far as I know.
7. The SusFS module is not yet updated. Please wait for it to be updated to fully use the feature. Devs and interested testers, Hope you know how to test it currently even without module being updated if required!
8. For Devs who like system-wide modifications, you can still use map_spoof but it's currently futile and incomplete. You can add your own code and continue though!
1. SusFS has released sus_maps and we have already kept a version on build. So OnePlus builds with map_spoof will not be continued.
2. The current version of sus_maps doesn't work on mounts made by mountify. So for Mountify users, it might not work. But Simon has provided possible instructions on how you can try in Gitlab. (I have not tried that method to comment on it currently)
3. Sus_maps is a method of hiding memory maps and normally detectors say Found Injection. Adding those paths should fix your detections.
4. Possible stuff you can hide are fonts, drivers, zygisk modules etc..
5. It works only on umounted apps and not system wide. Since it's a powerful feature, it might cause instability if applied globally.
6. Most of you wouldn't even need to use this feature as far as I know.
7. The SusFS module is not yet updated. Please wait for it to be updated to fully use the feature. Devs and interested testers, Hope you know how to test it currently even without module being updated if required!
8. For Devs who like system-wide modifications, you can still use map_spoof but it's currently futile and incomplete. You can add your own code and continue though!
No deleted account found from
💬 Send /lang to change language of the bot
84 scanned users from this group 🚫👻💬 Send /lang to change language of the bot
Forwarded from KernelSU Next Bot
KernelSU_Next_v1.1.1-29-ge11cab38_12880-release.apk
16.9 MB
CI Manager (TEST BUILD)
#ci_2680
Commit
Workflow run
#ci_2680
Don't write newline character to cgroup node (#2804)
This prevents su hang on oplus devices, maybe related to bad kernel
hooks.
Commit
Workflow run
KernelSU_Next_v1.1.1-29-ge11cab38-spoofed_12880-release.apk
16.9 MB
CI Manager (SPOOFED BUILD)
#ci_2680
Commit
Workflow run
#ci_2680
Don't write newline character to cgroup node (#2804)
This prevents su hang on oplus devices, maybe related to bad kernel
hooks.
Commit
Workflow run
Forwarded from Pavel Durov (Paul Du Rove)
Today, the European Union nearly banned your right to privacy. It was set to vote on a law that would force apps to scan every private message, turning everyone’s phone into a spying tool.
France led the push for this authoritarian law. Both former and current Interior Ministers, Bruno Retailleau and Laurent Nuñez, supported it. Last March, they declared that police should see French citizens’ private messages (more info here). The Republicans and Macron’s Renaissance group voted for it.
Such measures are supposed to “fight crime”, but their real target is regular people. It wouldn’t stop criminals — they could just use VPNs or special websites to hide. Officials’ and police messages wouldn’t be scanned either, since the law conveniently exempts them from surveillance. Only YOU — ordinary citizens — would face the danger of your private messages and photos being compromised.
Today, we defended privacy: Germany’s sudden stand saved our rights. But freedoms are still threatened. While French leaders push for total access to private messages, the basic rights of French people — and all Europeans — remain in danger.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Android Security & Malware
New Android BEERUS framework for dynamic analysis & reverse engineering
BEERUS brings Frida auto-injection, sandbox exfiltration, memory dumps, Magisk integration and more for on device app analysis.
https://github.com/hakaioffsec/beerus-android
BEERUS brings Frida auto-injection, sandbox exfiltration, memory dumps, Magisk integration and more for on device app analysis.
https://github.com/hakaioffsec/beerus-android
Forwarded from Android Security & Malware
0-click vulnerability in Dolby's DDPlus decoder affected Android (CVE-2025-54957)
A malformed audio file can trigger an out-of-bounds write due to integer overflow in evolution data handling—leading to memory corruption and crashes.
Android decodes audio messages locally, making this exploitable without user interaction.
Reproduction: Just send a crafted RCS voice message (dolby_android_crash.mp4)
Details: https://project-zero.issues.chromium.org/issues/428075495
A malformed audio file can trigger an out-of-bounds write due to integer overflow in evolution data handling—leading to memory corruption and crashes.
Android decodes audio messages locally, making this exploitable without user interaction.
Reproduction: Just send a crafted RCS voice message (dolby_android_crash.mp4)
Details: https://project-zero.issues.chromium.org/issues/428075495
Privacy + Secure Tech Corner Channel 🛡️
Next release!!! https://codeberg.org/comaps/comaps/releases/tag/v2025.10.08-3
Codeberg.org
v2025.10.16-1 - comaps/comaps
General:
- Improve fields available in editor following type objects by @map-per
- Added explanation on first map downloads
- Added option to avoid steps
Android:
- Remove add business button on the place page by @map-per
- Remove confirmation dialog…
- Improve fields available in editor following type objects by @map-per
- Added explanation on first map downloads
- Added option to avoid steps
Android:
- Remove add business button on the place page by @map-per
- Remove confirmation dialog…
Forwarded from Free Software[Android]
Element X
A fast, secure, and privacy-focused messenger built on the open Matrix network.
Element X lets you stay connected with friends, family, and communities — all while keeping control of your data.
Features:
• Real-time messaging & video calls
• Public and private group chats
• Reactions, polls, pinned messages & more
• Video calling while browsing messages
• Works with other Matrix apps (FluffyChat, Cinny, etc.)
• Open source and ad-free
Privacy-first: No tracking, no data mining — your conversations are yours.
Own your data:
Host on Matrix.org or your own server for full control.
Download: https://element.io/app
Source code: https://github.com/vector-im/element-x-android
#messaging #Matrix
@foss_Android
A fast, secure, and privacy-focused messenger built on the open Matrix network.
Element X lets you stay connected with friends, family, and communities — all while keeping control of your data.
Features:
• Real-time messaging & video calls
• Public and private group chats
• Reactions, polls, pinned messages & more
• Video calling while browsing messages
• Works with other Matrix apps (FluffyChat, Cinny, etc.)
• Open source and ad-free
Privacy-first: No tracking, no data mining — your conversations are yours.
Own your data:
Host on Matrix.org or your own server for full control.
Download: https://element.io/app
Source code: https://github.com/vector-im/element-x-android
#messaging #Matrix
@foss_Android
Forwarded from It's FOSS
UbuCon comes to India this November. Book your passes now! 🫶🇮🇳
https://news.itsfoss.com/events/first-ubucon-india/
https://news.itsfoss.com/events/first-ubucon-india/
Forwarded from Android Security & Malware
Media is too big
VIEW IN TELEGRAM
New Pixnapping Attack allows any Android app without permissions to leak info displayed by other apps exploiting Android APIs and a hardware side channel (CVE-2025-48561)
Pixnapping is not fixed and probably affects all Androids.
PoC: Not available yet.
Video demonstrates stealing 2FA codes from Google Authenticator. It's like taking screenshot. Pixnapping exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.
Info: https://www.pixnapping.com/
Pixnapping is not fixed and probably affects all Androids.
PoC: Not available yet.
Video demonstrates stealing 2FA codes from Google Authenticator. It's like taking screenshot. Pixnapping exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.
Info: https://www.pixnapping.com/
Forwarded from Android Security & Malware
APK Tool GUI: GUI for apktool, signapk, zipalign and baksmali utilities
https://github.com/AndnixSH/APKToolGUI
https://github.com/AndnixSH/APKToolGUI
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Chance
Imageboard browser built using Flutter intended for use on iOS and Android.
🔗 Links:
- Downtown
- Features
- Source code
Developer: Callum Moffat
🏷 Tags: #Android #iOS #Media #Social
Imageboard browser built using Flutter intended for use on iOS and Android.
🔗 Links:
- Downtown
- Features
- Source code
Developer: Callum Moffat
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #iOS #Media #Social