v14.1-Integrity-Box-CameraFix.zip
1.2 MB
v14 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅
changelog-
- Forced PIF FORK to use advance settings
- Switched to silent fingerprint fetching
- WebUI will remember your last used language forever
- Hides debug fingerprint detection
- Hides debug build detection
- Hides debug release key detection
- Integrated inbuilt popup toaser in WebUI
- Added spoofed ksu manager detection
- Dropped key checker
- Re desiged action button & set to auto mode for beginners who don't know what to chose in WEBUI
- Added Simplified Chinese translation in WEBUI thanks @Sullivan_block
- Fixed banner image error in manager for ksun users
- Shipped Integrity Box popup Toaster as user app
- Switched to sha256 + md5 file integrity verification
- Added 2 factor Authentication in keybox updator for user safety
- Updated boot hash noscript
- Debloated unnecessary java noscript codes
- Spoofed popup toaster
- Fixed Dutch language bug in WEBUI
- Drop Termux openssl bins deletions
- Added credits to supporters in WEBUI
- Optimised WEBUI
- Fixed inbuilt spoofing conflict on Pixelage ROM
- Added playstore version check with tutorial fix
- Updated CSS & various (34+) shell noscripts
- Createskipfile in internal storage if you want to skip toaster installation
- A few more changes I don't remember + no one cares
SHA256: df34484eb68e2ccecc29b62425053b6ea1c80628beb16b78dfb7012527b0c7ec
Module Features
Pre-Requirements
Preview
Support
1❤118👍19🔥15🗿13🫡5🥰4🏆4💋3
v15-Integrity-Box-14-08-2025.zip
505.2 KB
v14 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅
changelog-
• Fixed camera issue
•Added new module indicators: ROM sign indicator, Risky apps indicator, Flagged kernel indicator, Playstore version indicator, TEE indicator
• Introduced configuration to control certain module features
• Module toggle to switch between blacklist & whitelist modes will be enabled by default for magisk users for shamiko / nohello
• Debloated unused codes & cleaned up common noscripts
• Added option to disable custom font in WebUI (more fonts will be added in next update)
• Remote verification can now work without reboot after updating the module
• Updated 2FA & depreciated forced user to reboot to use keybox function after update
• Deprecated popup toaster app
• Deprecated md5 checks
• Dropped local hash verification file (hashes.txt)
• Updated uninstall noscript
moved prop, fingerprint, & aosp keybox to toolbox directory
• Shipped with pixel 8 fingerprint
• Updated cleanup noscript
SHA256: da39f688d27ca99d481ea9fa5bddf6dddcc476d4c4f3ac2e00ab1a8fdfaabc57Module Features
Pre-Requirements
Preview
Support
❤122👍26💋9🔥5🫡5🗿5👀3🏆1🍾1
𝗠𝗘𝗢𝗪𝗻𝗮 💅
v15-Integrity-Box-14-08-2025.zip
1❤71🔥9🥰4🗿3👍2🤝2😈1
v16-Integrity-Box-HOTFIX-20-08-2025.zip
385.8 KB
v16 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅
[RE-UPLOADED] FIXED UNEXPECTED CRASH ON MAGISK ALPHA
changelog-
• Fixed unexpected delay in action button(noscript) expectation.
• Now default target packages will be updated based on TEE status too, instead of forcing leaf certificate hack mode for devices with non broken TEE
• Disable intro in WebUI by default & added option to re-enable it in WebUI menu.
• Improved Keybox updater.
• Optimised installation noscript.
• Added more configuration flags
• Fixed Lsposed logs spoofing failure
• Replaced simple "echo" outputs with structured logging mechanism for better traceability.
• Added a consistent logging format including timestamp for each log entry to improve readability and debugging.
• Implemented log file capturing using "tee -a" to ensure both console visibility and file persistence of logs.
• Ensured that all network retry attempts are logged with clear retry counters for transparency.
• Improved reliability of network connectivity checks by introducing a maximum retry limit with controlled loop execution.
• Enhanced error handling by introducing explicit exit codes upon failure conditions for better integration with other noscripts.
• Suppressed unnecessary command outputs to keep logs clean and focused only on meaningful information.
• Introduced graceful exit after maximum retry attempts to avoid indefinite loops in case of no internet connectivity.
• Standardized indentation, spacing, and code structure for improved readability and maintainability.
• Consolidated redundant command sequences to simplify the flow and reduce noscript overhead.
• Improved user feedback by ensuring retry attempts and failure messages are displayed consistently.
• Added robust handling of slow or unstable network scenarios to minimize false negatives.
• Ensured compatibility with BusyBox environment by using portable shell syntax.
• Improved overall noscript maintainability by reducing noise and making error handling self-explanatory.
• Strengthened integration readiness by introducing reliable log capturing that can be parsed or shared easily.
• Ensured that no sensitive data or unnecessary verbose output is written into the log files.
• Refined exit behavior to prevent accidental continuation of dependent operations in case of failure.
• Improved noscript resilience under low-resource or high-latency conditions.
• General code cleanup to maintain long-term stability.
• Custom fonts will be added in next update (got no time to find fonts).
• Logs will be zipped automatically, if you face any issue, just send me the log zip file
SHA256: 11e8360bbcc7745276c734c7d4fb86c6dc5be42922a570dbdbd7c79bee0806e3
Module Features
Pre-Requirements
Preview
Support
❤172👍29🔥25🗿11💋9🫡9😘5😁2🏆2💊2👾2
Introducing Swipe to Screenshot⭐
This module lets you take screenshots using three-finger tap or swipe gestures on any rooted Android device. It works by tracking touch input directly, so it doesn’t need Accessibility permissions or screen overlays. This makes it fast, accurate, and easy to use.
This module can be especially helpful for those with broken volume or power buttons, or for ROMs like LineageOS and stock ROMs that don’t support three-finger screenshot gestures natively.
📱 https://github.com/MeowDump/Three-Finger-Screenshot
This module lets you take screenshots using three-finger tap or swipe gestures on any rooted Android device. It works by tracking touch input directly, so it doesn’t need Accessibility permissions or screen overlays. This makes it fast, accurate, and easy to use.
This module can be especially helpful for those with broken volume or power buttons, or for ROMs like LineageOS and stock ROMs that don’t support three-finger screenshot gestures natively.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤115👌17🔥12🗿10👏6👍5😁4🫡3🏆1💊1👾1
v1-Three-Finger-Screenshot-23-08-2025.zip
57.1 KB
❤92🫡16👍8🗿8🏆5👾3🔥2👌2💊2🆒1
let's revive some outdated modules.
changelog-
expect a new update in few minutes
changelog-
• Replaced Key Checker with Flag Checker
• Merged WebUI noscripts & Action noscript in one noscript
• Redesigned WebUI with card based UI
• Improved live terminal logging
• Whitelisted Pixel Launcher components
• Fixed WebUI compatibility with MMRL
• Dropped meow helper activity dependency for popups
expect a new update in few minutes
❤62🔥11🗿6👍2❤🔥1💊1
v3-AntiBloat-AOSP-26-08-2025.zip
35.7 KB
v3 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅
A little context about this module for new subscribers in this channel:
i collected more than 70 apps from different aosp roms (vanilla & gapps builds). they keep running in background but the strange part is freezing/disabling them doesn’t affect stability or user experience. the number keeps growing with every android update. and no, it’s not just google apps. even pure vanilla without gapps has a lot of crap. the main goal of this module is to freeze these apps to extend battery life & improve performance.
SHA256: 67c5d364882bd3489249d833e2e5e67ca00418350e4d94ddd0eb3940b30cb2e5
changelog
1❤129⚡9👍8🔥5🗿5💊5🏆3👨💻1
𝗠𝗘𝗢𝗪𝗻𝗮 💅
v16-Integrity-Box-HOTFIX-20-08-2025.zip
Please update it by clicking on action button
Please open Telegram to view this post
VIEW IN TELEGRAM
8❤196🫡55🗿14😱10💋8❤🔥5🔥5👀4👏3👾3💊1
Media is too big
VIEW IN TELEGRAM
Note: Don't enable Spoof Provider if you want to use Google Wallet💱
Please open Telegram to view this post
VIEW IN TELEGRAM
2❤142🗿26👍14🫡14👏9🏆3💋3😁2💘2❤🔥1👾1
v3-Quiet-Kill-30-08-2025.zip
39.6 KB
v3 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅
MODULE INFO:
Just press the power button to lock your device this will instantly kill all apps running in the background and foreground.
Want to whitelist an app so it doesn't get killed?
Just copy its package name and paste it into the Ignore List block in the WebUI.
To disable/re-enable the "power key kill" feature, simply click the Action button in the module.
## Changelog
### Power-key listener (quick tap)
• Added low-CPU event reader using/dev/input/event0with raw power key codes (DOWN/UP).
• Added fallback polling loop usinggetevent -lqc1with 0.2s interval and 4s timeout.
• Added timestamped logging to/data/adb/modules/QuiteKill/logs/kill.logand ensured log dir creation.
• Added float diff withbcwhen available, falls back toawk.
• Auto-selects event source: usesevent0if readable, otherwise falls back to polling.
• Preserved thresholds:CLICK_THRESHOLD=0.3,COOLDOWN=5.
• Removed popup UI integration. Replaced on-screen toasts with log entries.
• Removedpopup()and am start... meow.helper.MainActivity.
• Reduced CPU usage by eliminating tight loops andseq-based polling.
### Kill engine (QuiteKill.sh)
• Log file path changed from$MODDIR/webroot/output.logto$MODDIR/logs/output.log.
• Ignore list and ForceKill list parsing unchanged.
• Behavior unchanged: kills all user apps, kills only listed system apps.
### Web UI (index.html)
• Switched to Material Icons and Material Symbols. Added customMonafont.
• New snackbar notifications (success, error, info). Replacedalert().
• Added ripple effects and proper loading states for action buttons.
• Terminal panel upgrades:
• Auto-scroll toggle
• Live killed and skipped counters
• Log filter search
• Copy log
• Export log
• Clear log
• Export now writes to/sdcard/kill-control-log.txt.
• Input sanitization for package names when adding to lists.
• Theme improvements: new palette, shadows, larger radii, prefers-color-scheme support, persistent choice.
• Updated log source path to$MODDIR/logs/output.logto match backend.
• UI layout and list items refined. Truncates long package names with ellipsis.
• Removed emoji-only section headers and the old minimal log-controls row.
### Removals and structure cleanup
• Removed dependency on the popup helper app.
• Removedwebrootas a log target. All logs standardized under$MODDIR/logs/.
• Removed legacy alert-based messaging.
### Impact
• Lower CPU usage and more reliable power key detection.
• Unified logging across backend and UI.
• Better UX with actionable log tools and clear status feedback
SHA256: 55e2af925026d7d9e914d47f68eb2027d04c6e40c2da50bdabd2e0960586a68b
Please open Telegram to view this post
VIEW IN TELEGRAM
1❤85🗿13⚡10👍9🔥6💋3😈1💊1
I Need to Talk About Something Serious (Magisk & KSU Vulnerability)
I’m creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
I’ve never reported a sensitive vulnerability before, and honestly, I’m not sure how to do it right. That’s why I need your help and advice
Let’s keep the group free from drama and behave like adults. Thanks for understanding!
I’m creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Please keep the group respectful and focused. Each member can post only one message every 1 hours, so think carefully before you send it (you can always edit your message later).
I’ve never reported a sensitive vulnerability before, and honestly, I’m not sure how to do it right. That’s why I need your help and advice
Let’s keep the group free from drama and behave like adults. Thanks for understanding!
❤76👍20🗿18🔥4💋4❤🔥1😁1💯1
I Need to Talk About Something Serious (KernelSU-Magisk Vulnerability)
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And it’s very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I don’t want to give too many hints, but honestly, this is more dangerous than any exploit I’ve seen so far.
At the time, I didn’t report it because it’s shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. I’ve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
I’m genuinely worried about this. I don’t want to be the reason something bad happens, but I also don’t want to stay silent if the damage is still possible
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
~ Regards @MeowDump
A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And it’s very easy to exploit.
What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I don’t want to give too many hints, but honestly, this is more dangerous than any exploit I’ve seen so far.
At the time, I didn’t report it because it’s shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. I’ve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.
I’m genuinely worried about this. I don’t want to be the reason something bad happens, but I also don’t want to stay silent if the damage is still possible
Now I’m stuck and really need your advice:
Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims
Please share your thoughts. Your suggestions will help me decide the best way forward.
Also, please don’t DM me asking what the vulnerability is😬 If I felt it was safe to share, I would’ve already. Thanks for understanding.
~ Regards @MeowDump
10❤123🫡43👍21🗿9👀6💋3🏆2💊2🔥1💯1👾1
Which of the following approaches would you recommend? (Multiple selections allowed)
Anonymous Poll
33%
Create an public issue on Magisk/KSU repo
65%
Report it to Magisk/KSU devs via email/dm (privately)
25%
Make people aware how it works
6%
Don't do anything, let it happen
2👍77🫡24❤13🗿10💋9😱8🔥3🏆2
i got a response, and it turns out 🫚 KSU and 🎭 Magisk can’t prevent this issue.
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. I’m sharing a screen recording, watch it carefully and share it with someone who's device is rooted
(I already knew this, that’s why I made the poll. If I had dropped the awareness directly, many would’ve just blamed me or said I’m promoting it🙌 )
The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. I’m sharing a screen recording, watch it carefully and share it with someone who's device is rooted
Please open Telegram to view this post
VIEW IN TELEGRAM
👍94❤36🗿21😱8🫡4👨💻2😁1🆒1
Media is too big
VIEW IN TELEGRAM
Not everything labeled “open source” is actually safe, and not everything on GitHub is what it looks like. Don’t blindly trust random Magisk modules floating around, stick to trusted sources.
At the end of the day, your device and your data are your responsibility.
📱 𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
At the end of the day, your device and your data are your responsibility.
Please open Telegram to view this post
VIEW IN TELEGRAM
2🗿182❤106🫡51🔥24👍18😁13😱12👻12👌4🆒4👏2