https://github.com/chickendrop89/magisk-swapspace
Magisk-swapspace
This module allows for creating a persistent swap space on android
Magisk-swapspace
This module allows for creating a persistent swap space on android
GitHub
GitHub - chickendrop89/magisk-swapspace: This module allows for creating a persistent swap space on android
This module allows for creating a persistent swap space on android - chickendrop89/magisk-swapspace
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from skroot
SKRootPro4.0模块开发例程:
https://github.com/abcz316/SKRoot-linuxKernelRoot/tree/master/Pro(%E5%B7%B2%E5%BC%80%E5%8F%91%E5%AE%8C%E6%88%90%EF%BC%8C%E6%B5%8B%E8%AF%95%E4%B8%AD)/sources/testModule
testModule 模块目录清单:
──────────────────────────────
• SKRoot 内核模块开发 SDK .................. kernel_module_kit
• SDK 全接口回归测试工程(源码) .......... kernel_module_kit_test
模块示例:
──────────────────────────────
• Hello World 示例模块(源码)............ module_hello_world
• 内置 WebUI 模块示例(源码)............. module_web_ui_example
• 模块更新 JSON 演示模块(源码).......... module_update_demo
• 隐藏 /data 路径功能模块(源码)........ module_hide_data_dir
• 清理 USB 调试痕迹模块(源码)........... module_clear_usb_trace
• TrickyStore集成模块(源码)................. module_tricky_store
──────────────────────────────
https://github.com/abcz316/SKRoot-linuxKernelRoot/tree/master/Pro(%E5%B7%B2%E5%BC%80%E5%8F%91%E5%AE%8C%E6%88%90%EF%BC%8C%E6%B5%8B%E8%AF%95%E4%B8%AD)/sources/testModule
testModule 模块目录清单:
──────────────────────────────
• SKRoot 内核模块开发 SDK .................. kernel_module_kit
• SDK 全接口回归测试工程(源码) .......... kernel_module_kit_test
模块示例:
──────────────────────────────
• Hello World 示例模块(源码)............ module_hello_world
• 内置 WebUI 模块示例(源码)............. module_web_ui_example
• 模块更新 JSON 演示模块(源码).......... module_update_demo
• 隐藏 /data 路径功能模块(源码)........ module_hide_data_dir
• 清理 USB 调试痕迹模块(源码)........... module_clear_usb_trace
• TrickyStore集成模块(源码)................. module_tricky_store
──────────────────────────────
GitHub
SKRoot-linuxKernelRoot/Pro(已开发完成,测试中)/sources/testModule at master · abcz316/SKRoot-linuxKernelRoot
新一代SKRoot,完美隐藏root功能,挑战全网root检测手段,实现真正的SELinux 0%触碰、无挂载,通用性强,通杀所有内核,不需要内核源码,直接patch内核,兼容安卓APP直接JNI调用,稳定不闪退。 - abcz316/SKRoot-linuxKernelRoot
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from skroot
SKRootPro4.1.3,模块开发SDK(含静态库),供学习.7z
5.7 MB
This media is not supported in your browser
VIEW IN TELEGRAM
OverlayFS and Magic Mount are related but they’re not the same thing:
OverlayFS
This is a standard Linux kernel feature. It lets you “overlay” one filesystem on top of another so that changes appear in an upper layer while the original files remain untouched in a lower layer. It’s commonly used for things like live systems, containers, or read-only system partitions where you want to add or modify files without actually changing the base filesystem.
Magic Mount
This is not a kernel feature but rather a user-space mechanism used by Magisk (or similar root frameworks). It uses OverlayFS under the hood to “magically” mount modified or additional files into Android’s system or vendor partitions without actually rewriting those partitions. It’s basically a way to inject files and changes at boot time so apps and the OS see them as if they’re native, while keeping the real partitions untouched.
So, OverlayFS is the underlying Linux tech, and Magic Mount is a Magisk implementation that uses it to provide systemless modification on Android.
OverlayFS
This is a standard Linux kernel feature. It lets you “overlay” one filesystem on top of another so that changes appear in an upper layer while the original files remain untouched in a lower layer. It’s commonly used for things like live systems, containers, or read-only system partitions where you want to add or modify files without actually changing the base filesystem.
Magic Mount
This is not a kernel feature but rather a user-space mechanism used by Magisk (or similar root frameworks). It uses OverlayFS under the hood to “magically” mount modified or additional files into Android’s system or vendor partitions without actually rewriting those partitions. It’s basically a way to inject files and changes at boot time so apps and the OS see them as if they’re native, while keeping the real partitions untouched.
So, OverlayFS is the underlying Linux tech, and Magic Mount is a Magisk implementation that uses it to provide systemless modification on Android.
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
🗼5G Is Coming Soon
The American Broadband Deployment Act of 2025 (H.R. 2281) has been introduced in Congress. If it passes, state and local governments will lose their ability to stop 5G small-cell installations in their communities.
These aren’t traditional cell towers. “Small Personal Wireless Service Facilities” are compact 5G mmWave antennas mounted under 50 feet—on light poles, traffic signals, buildings. You’ve likely already seen them without realizing it.
The bill overrides local regulations and streamlines approvals.
This dense 5G infrastructure is a key layer for cameras, sensors, robotics, drones, and AI-driven surveillance—while impacts on people, animals, and the environment are an afterthought.
Raise the alarm. Share this locally.
🪧 Read the full article on Substack
📲 Get privacy gear
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
The American Broadband Deployment Act of 2025 (H.R. 2281) has been introduced in Congress. If it passes, state and local governments will lose their ability to stop 5G small-cell installations in their communities.
These aren’t traditional cell towers. “Small Personal Wireless Service Facilities” are compact 5G mmWave antennas mounted under 50 feet—on light poles, traffic signals, buildings. You’ve likely already seen them without realizing it.
The bill overrides local regulations and streamlines approvals.
This dense 5G infrastructure is a key layer for cameras, sensors, robotics, drones, and AI-driven surveillance—while impacts on people, animals, and the environment are an afterthought.
Raise the alarm. Share this locally.
🪧 Read the full article on Substack
📲 Get privacy gear
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from KernelSU Next Bot
KernelSU_Next_v3.0.0-32-g5dc52a42_32889-release.apk
9 MB
Dev Manager Build (Normal)
#ci_2889
Commit
Workflow run
#ci_2889
manager: implement new method to get manager app uid (fix developer mode crash)
Commit
Workflow run
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from KernelSU Next Bot
KernelSU_Next_v3.0.0-32-g5dc52a42-spoofed_32889-release.apk
9 MB
Dev Manager Build (Spoofed)
#ci_2889
Commit
Workflow run
#ci_2889
manager: implement new method to get manager app uid (fix developer mode crash)
Commit
Workflow run
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from CI/beta
SukiSU_v4.1.0_40388-release.apk
12 MB
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🤦 Hackers built #ransomware — then left the key behind.
CyberVolk’s new VolkLocker targets 💻 Windows and 🐧 Linux.
The flaw? the lock key is hard-coded and saved as a plain file on the system.
Files can be unlocked for free — but after 48 hours, it can wipe 🗑️ personal folders.
🔗 Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
CyberVolk’s new VolkLocker targets 💻 Windows and 🐧 Linux.
The flaw? the lock key is hard-coded and saved as a plain file on the system.
Files can be unlocked for free — but after 48 hours, it can wipe 🗑️ personal folders.
🔗 Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html