Forwarded from KernelSU Next
This media is not supported in your browser
VIEW IN TELEGRAM
Donation support button for modules devs
I might filter this only to well known genuine devs, like it will be opt-in for certain devs to minimize obvious scammer module devs, tho not certainly final if I will make it opt-in or available for all devs
module.prop variable will be
donate=https://example.com
I might filter this only to well known genuine devs, like it will be opt-in for certain devs to minimize obvious scammer module devs, tho not certainly final if I will make it opt-in or available for all devs
module.prop variable will be
donate=https://example.com
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Aerath's Free Time Funs (Aerath Xlythe)
Hi everyone,
The new release is ready to production 🎉
Changelog for now:
- Fix crash-like feature
- Redesign AppSettingsFragment
- Try to reduce the memory usage on boot
- Try to adapt the IzzyOnDroid requirements
- Add "error-only log" feature
- Add some new hooks to cover more install source checks
- Fix Xiaomi related crashes for app icon loader
- Add new apps into preset lists (thanks Yurii0307#github)
- Add "Bulk config wizard" (apply one config to more than one apps)
- Other fixes and improvements
Also I uploaded the translation strings before the release as before, feel free to translate 😇
Thanks for community, this app grows with your support!
The new release is ready to production 🎉
Changelog for now:
- Fix crash-like feature
- Redesign AppSettingsFragment
- Try to reduce the memory usage on boot
- Try to adapt the IzzyOnDroid requirements
- Add "error-only log" feature
- Add some new hooks to cover more install source checks
- Fix Xiaomi related crashes for app icon loader
- Add new apps into preset lists (thanks Yurii0307#github)
- Add "Bulk config wizard" (apply one config to more than one apps)
- Other fixes and improvements
Also I uploaded the translation strings before the release as before, feel free to translate 😇
Thanks for community, this app grows with your support!
Forwarded from Aerath's Free Time Funs (Aerath Release Uploader)
HMA-OSS-oss-137-debug.apk
8.3 MB
Welcome to new version (#51) with Crowdin updates (#47)
- Fix crash-like feature
- Redesign AppSettingsFragment
- Try to reduce the memory usage on boot
- Try to adapt the IzzyOnDroid requirements
- Add "error-only log" feature
- Add some new hooks to cover more install source checks
- Fix Xiaomi related crashes for app icon loader
- Add new apps into preset lists (#49)
- Add "Bulk config wizard"
- Other fixes and improvements
- Fix crash-like feature
- Redesign AppSettingsFragment
- Try to reduce the memory usage on boot
- Try to adapt the IzzyOnDroid requirements
- Add "error-only log" feature
- Add some new hooks to cover more install source checks
- Fix Xiaomi related crashes for app icon loader
- Add new apps into preset lists (#49)
- Add "Bulk config wizard"
- Other fixes and improvements
Forwarded from Aerath's Free Time Funs (Aerath Xlythe)
And finally we're in IzzyOnDroid too! 🎉 thanks the community for the IzzyOnDroid request 😇
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Android Security & Malware
Analysis of CVE-2025-31200, a zero-day, zero-click RCE in iOS. Triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalation (CVE-2025-31201), and allowed token theft until patched in iOS 18.4.1 (Apr 16, 2025)
https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201
GitHub
GitHub - JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201: CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s…
CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalati...
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Android Security & Malware
CVE-2025-38352 - In-the-wild Android Kernel Vulnerability Analysis + PoC
https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/
PoC: https://github.com/farazsth98/poc-CVE-2025-38352
https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/
PoC: https://github.com/farazsth98/poc-CVE-2025-38352
faith2dxy.xyz
CVE-2025-38352 (Part 1) - In-the-wild Android Kernel Vulnerability Analysis + PoC
Part 1 (This blog post) - In-the-wild Android Kernel Vulnerability Analysis + PoC Part 2 - Extending The Race Window Without a Kernel Patch CVE-2025-38352 was a…