𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣 – Telegram
𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
30.7K subscribers
300 photos
51 videos
172 files
230 links
#FreeDurov ♥️
Download Telegram
v1-Three-Finger-Screenshot-23-08-2025.zip
57.1 KB
92🫡16👍8🗿8🏆5👾3🔥2👌2💊2🆒1
let's revive some outdated modules.

changelog-
• Replaced Key Checker with Flag Checker
• Merged WebUI noscripts & Action noscript in one noscript
• Redesigned WebUI with card based UI
• Improved live terminal logging
• Whitelisted Pixel Launcher components
• Fixed WebUI compatibility with MMRL
• Dropped meow helper activity dependency for popups


expect a new update in few minutes
62🔥11🗿6👍2❤‍🔥1💊1
v3-AntiBloat-AOSP-26-08-2025.zip
35.7 KB
v3 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅


A little context about this module for new subscribers in this channel:
i collected more than 70 apps from different aosp roms (vanilla & gapps builds). they keep running in background but the strange part is freezing/disabling them doesn’t affect stability or user experience. the number keeps growing with every android update. and no, it’s not just google apps. even pure vanilla without gapps has a lot of crap. the main goal of this module is to freeze these apps to extend battery life & improve performance.

SHA256: 67c5d364882bd3489249d833e2e5e67ca00418350e4d94ddd0eb3940b30cb2e5

changelog
11299👍8🔥5🗿5💊5🏆3👨‍💻1
𝗠𝗘𝗢𝗪𝗻𝗮 💅
v16-Integrity-Box-HOTFIX-20-08-2025.zip
🖥OLD KEYBOX IS NOW REVOKED

Please update it by clicking on action button
Please open Telegram to view this post
VIEW IN TELEGRAM
8196🫡55🗿14😱10💋8❤‍🔥5🔥5👀4👏3👾3💊1
Media is too big
VIEW IN TELEGRAM
Note: Don't enable Spoof Provider if you want to use Google Wallet💱
Please open Telegram to view this post
VIEW IN TELEGRAM
2142🗿26👍14🫡14👏9🏆3💋3😁2💘2❤‍🔥1👾1
v3-Quiet-Kill-30-08-2025.zip
39.6 KB
v3 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅


MODULE INFO:
Just press the power button to lock your device this will instantly kill all apps running in the background and foreground.

Want to whitelist an app so it doesn't get killed?
Just copy its package name and paste it into the Ignore List block in the WebUI.

To disable/re-enable the "power key kill" feature, simply click the Action button in the module.

## Changelog

### Power-key listener (quick tap)
• Added low-CPU event reader using /dev/input/event0 with raw power key codes (DOWN/UP).
• Added fallback polling loop using getevent -lqc1 with 0.2s interval and 4s timeout.
• Added timestamped logging to /data/adb/modules/QuiteKill/logs/kill.log and ensured log dir creation.
• Added float diff with bc when available, falls back to awk.
• Auto-selects event source: uses event0 if readable, otherwise falls back to polling.
• Preserved thresholds: CLICK_THRESHOLD=0.3, COOLDOWN=5.
• Removed popup UI integration. Replaced on-screen toasts with log entries.
• Removed popup() and am start ... meow.helper.MainActivity.
• Reduced CPU usage by eliminating tight loops and seq-based polling.

### Kill engine (QuiteKill.sh)
• Log file path changed from $MODDIR/webroot/output.log to $MODDIR/logs/output.log.
• Ignore list and ForceKill list parsing unchanged.
• Behavior unchanged: kills all user apps, kills only listed system apps.

### Web UI (index.html)
• Switched to Material Icons and Material Symbols. Added custom Mona font.
• New snackbar notifications (success, error, info). Replaced alert().
• Added ripple effects and proper loading states for action buttons.
• Terminal panel upgrades:
• Auto-scroll toggle
• Live killed and skipped counters
• Log filter search
• Copy log
• Export log
• Clear log
• Export now writes to /sdcard/kill-control-log.txt.
• Input sanitization for package names when adding to lists.
• Theme improvements: new palette, shadows, larger radii, prefers-color-scheme support, persistent choice.
• Updated log source path to $MODDIR/logs/output.log to match backend.
• UI layout and list items refined. Truncates long package names with ellipsis.
• Removed emoji-only section headers and the old minimal log-controls row.

### Removals and structure cleanup
• Removed dependency on the popup helper app.
• Removed webroot as a log target. All logs standardized under $MODDIR/logs/.
• Removed legacy alert-based messaging.

### Impact
• Lower CPU usage and more reliable power key detection.
• Unified logging across backend and UI.
• Better UX with actionable log tools and clear status feedback

SHA256: 55e2af925026d7d9e914d47f68eb2027d04c6e40c2da50bdabd2e0960586a68b


📱 https://github.com/MeowDump/QuietKill
Please open Telegram to view this post
VIEW IN TELEGRAM
185🗿1310👍9🔥6💋3😈1💊1
I Need to Talk About Something Serious (Magisk & KSU Vulnerability)

I’m creating a temporary discussion group linked to this channel and would really appreciate your suggestions.
Please keep the group respectful and focused. Each member can post only one message every 1 hours, so think carefully before you send it (you can always edit your message later).


I’ve never reported a sensitive vulnerability before, and honestly, I’m not sure how to do it right. That’s why I need your help and advice

Let’s keep the group free from drama and behave like adults. Thanks for understanding!
76👍20🗿18🔥4💋4❤‍🔥1😁1💯1
I Need to Talk About Something Serious (KernelSU-Magisk Vulnerability)

A few months ago, I found a serious vulnerability in Magisk & KSU (and their forks). This flaw gives full root access to an attacker, meaning they can control your device completely, inject malicious code, install trackers, or even brick it permanently. Basically, anything which is possible with root access, And it’s very easy to exploit.

What makes it worse is that this exploit can work like either rat poison or sweet poison it can either harm your device instantly, or it could be damaging it silently right now without your knowledge. I don’t want to give too many hints, but honestly, this is more dangerous than any exploit I’ve seen so far.

At the time, I didn’t report it because it’s shockingly easy to exploit, and I was honestly scared that if the wrong person saw it before it got fixed, it could cause serious damage to a lot of people. I’ve tried different ways to block or patch it on my end, and while I did find a workaround, but it's just a temporary band-aid, not a solution.

I’m genuinely worried about this. I don’t want to be the reason something bad happens, but I also don’t want to stay silent if the damage is still possible

Now I’m stuck and really need your advice:

Should I report this vulnerability now?
Or should I wait knowing someone else might already be exploiting it and risk a mass attack on rooted devices? Or should I raise awareness about how it works and how people can protect themselves from becoming victims


Please share your thoughts. Your suggestions will help me decide the best way forward.

Also, please don’t DM me asking what the vulnerability is😬 If I felt it was safe to share, I would’ve already. Thanks for understanding.

~ Regards @MeowDump
10123🫡43👍21🗿9👀6💋3🏆2💊2🔥1💯1👾1
2👍77🫡2413🗿10💋9😱8🔥3🏆2
i got a response, and it turns out 🫚KSU and 🎭Magisk can’t prevent this issue.
(I already knew this, that’s why I made the poll. If I had dropped the awareness directly, many would’ve just blamed me or said I’m promoting it🙌)

The only smart move now is to spread awareness before someone actually exploits it and takes out devices in bulk. Maybe someone else will figure out a fix. I’m sharing a screen recording, watch it carefully and share it with someone who's device is rooted
Please open Telegram to view this post
VIEW IN TELEGRAM
👍9436🗿21😱8🫡4👨‍💻2😁1🆒1
Media is too big
VIEW IN TELEGRAM
Not everything labeled “open source” is actually safe, and not everything on GitHub is what it looks like. Don’t blindly trust random Magisk modules floating around, stick to trusted sources.

At the end of the day, your device and your data are your responsibility.

📱 𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Please open Telegram to view this post
VIEW IN TELEGRAM
2🗿182106🫡51🔥24👍18😁13😱12👻12👌4🆒4👏2
𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Built specially for non root users
Updated! [FIXED] error while fetching keybox 😙

🏆 https://integritybox.vercel.app
Please open Telegram to view this post
VIEW IN TELEGRAM
84🗿19🔥14👍12💋9🥰2😱2👾2💊1
HMA.json
24.3 KB
Import this file in HMAL / HMA
last updated on 11 september 2025
2146💋20🗿10👍7🔥7🏆5😱4👻4🫡3
v17.1-Integrity-Box-07-09-2025.zip
388.5 KB
v17.1 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅


changelog-
Changelog v17.1

• Fixed “operation not permitted” error during installation.
• Removed self-destruct mode.
• Fixed Hide PIF Detection button not working.
• Cleaned up unnecessary code.
• Changed module ID.
• Fixed module denoscription not updating for Magisk users.
• Fixed action summary result bug.
• Improved PIF fork spoofing noscript
Removed anti-tampering detection, (It’s not stable yet and needs a lot more testing and fine-tuning. I don’t have enough time to keep it in right now. Maybe in the future when I get the chance, it will come back in a better form)

Changelog v17

• Updated Keybox
• Cleaned debug fingerprint by default
• Introduced Anti Tampering Protection
• Introduced Self Destruct mode
• Added SHA512+SHA256+MD5 hash with salt verification on install
• Fixed banned kernel false positive indicator
• Create NoLineageProp flag in /data/adb/Box•Brain to clean LineageOS props
• Added verification summary on install
• Added spoofVendingSdk support for PifFork spoofing [WEBUI]
• Fixed delay handler for KSU [ACTION]
• Fixed TS patch button not working [WEBUI]
• Dropped target.txt auto update on boot 
• Dropped modal auto close switch [WEBUI]
• Introduced hide/unhide extra features button in WebUI 
• Fixed target & keybox backup restore bug on uninstall
• Updated supporter list [WEBUI]
• Denoscription will now refresh on boot instead of action

SHA256: 036bd5a6fbeed246a174a23362b53c6906dbca0aa07c43aad8fecbc0321998aa

Module Features
Pre-Requirements
Preview
Support
117🔥18🫡9🗿9💋8🥰3🤗3🏆2😎2😘1💊1
v18-Integrity-Box-09-09-2025.zip
404.5 KB
v18 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅


changelog-
• Added WebUI support for spoofing PifFork’s advanced settings
• Introduced SELinux spoofer (create /data/adb/Box-Brain/selinux to force spoofing to enforcing)
• Fixed Hide Pif detection button not working
• Updated WebUI shortcut icon
• Updated WebUI-X configuration file with latest changes
• Dropped legacy PifFork spoof shell noscript (now handled by WebUI)
• Fixed WebUI resizing issue when enabling hidden features
• Added cleanup routine to wipe leftover files on uninstallation
• Forced ksu-webui as the default WebUI engine
• Improved installation and upgrade logic for cleaner dirty flashes
• Optimized noscript execution speed and reduced unnecessary overhead
• Enhanced error handling and fail-safe mechanisms
• Added japanese translation, thanks @ot_inc
• Improved compatibility with recent Magisk and KernelSU builds
• Refined logging output for easier debugging
• Polished UI animations and theme handling
• Minor code cleanup and refactoring for long-term maintainability

SHA256: 21abc45401234fb9e3cda2a0b1cdf2bb21ab52021319f9e52364435e2afed248

Module Features
Pre-Requirements
Support
2126👍21💋11🗿8🔥6🏆5🙈4❤‍🔥2😈1👨‍💻1👾1
v19-Integrity-Box-11-09-2025.zip
430.5 KB
v19 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅


changelog-
• Added Control Center button in WebUI for easier module customization 
• Spoofing toggles now remember their last configuration 
• Nuked native detector from target.txt (was causing Tricky Store detection) 
• Added popup function in PIF spoofer 
• Module denoscription now updates on action for seamless updates 
• Removed SELinux changer button from WebUI  ( selinux spoofer flag cover it )
• Shipped with Pixel Tablet fingerprint 
• Updated installation & uninstallation noscripts 
• Fixed keybox updater error when running from WebUI 
• Dropped support for kitsune mask
• Updated HMA config 
• Improved overall stability and performance 
• Minor bug fixes and optimizations 
• Refined UI elements for a smoother experience

SHA256: b2ca3696fddf714302e12493f7e24b7857d2c3b46f08da379f31391b62d35b97

📱 Pre-Requirements | Support
Please open Telegram to view this post
VIEW IN TELEGRAM
1161👍17🫡13🗿9💋7👌6👾4😇3🔥2💊2😈1
v20-Integrity-Box-19-09-2025.zip
92.6 KB
v20 by 𝗠𝗘𝗢𝗪𝗻𝗮 💅


changelog- 
Added Playstore auto update disabler
• Added Spoof debug fingerprint toggle
• Added Spoof build tag toggle
• Added Spoof debug build toggle
• Added repair mode (experimental)
• Added reset Playstore toggle (enables auto update)
• Reduced module size by 80%

• Depreciated add system apps to target list function
• Depreciated enable/disable intro button
• Depreciated switch to AOSP keybox button
• Depreciated enable/disable modal timeout button
• Depreciated hidded webui function html
• Depreciated Derpfest spoofing button
• Depreciated XiaomiEU spoofing button
• Depreciated HelluvaOS spoofing button
• Depreciated PixelOS spoofing button
• Depreciated Derpfest spoofing button
• Depreciated join telegram channel button
• Depreciated module info button
• Depreciated enable inbuilt GMS spoofing button
• Depreciated banned keybox list button
• Depreciated Prop detection button
• Depreciated custom intro font
• Depreciated aosp keybox.xml
• Depreciated HMA config.json
• Depreciated module toggle mode switcher
• Depreciated background sparkles in webui
• Depreciated game
• Depreciated report shell noscript & merged into webui
• Depreciated community support shell noscript & merged into webui

• Improved flagged apps detection
• Improved module denoscription updater
• Improved webui interface

• Replaced linotte with cocon font
• Nuked webui border
• Nuked unused codes
• Merged anti debug noscript in late start service
• Shipped with Pixel 9 fingerprint
SHA256: a93538c8e63efad1cee885c25dad4d412258a144b12bc3057126341174dc9206

📱 Pre-Requirements | Support
Please open Telegram to view this post
VIEW IN TELEGRAM
165🔥21🫡12👍10💋10🗿9🥰3😁2👏1👻1😇1
Media is too big
VIEW IN TELEGRAM
😙Passing Play Integrity is now possible even with banned kernel strings 🧀

📱 𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣
Please open Telegram to view this post
VIEW IN TELEGRAM
227🔥43👍19🗿19🍾14💋9🆒6😁5👾4🫡3🏆2
Journey from 80MB to 69KB

Didn't realize how fast four months passed when Google killed the old methods and forced keybox, my Integrity Box module was unstable , experimental & incomplete, but I still released it because people needed a fix. Back then it was 80 MB, now it’s just 69 KB😁 Through this project i experimented with a lot of things, I learned about base69, OpenSSL, ROT13, hex, HTML, CSS, JS, and more

I got love, I got hate, and that what proves I’m actually doing something. Some 🥷🏿's thinks they’re “more skilled”, no doubt they are, but I’m just doing this as a hobby. It's funny enough that they're comparing them with an advocate😭

Maybe they don’t really hate me, they’re just jealous that they don’t get the same love and support I do.
I ended up destroying the businesses of many keybox sellers,😹💔 and the more haters talked about me, the more people discovered my work. Once they used it, they never looked back

You may have noticed we share a lot of common Telegram groups, but you never saw me active anywhere I used to search my name on Telegram just to see who was talking shit about me, laughing at those lifeless beings 🤣🤣 I can’t explain how funny that feeling is (telling this cuz i don't have time to this now)
Being hated by idiots is the price you pay for not being one of them😁

I don’t waste time on keyboard warriors, I let my work speak, not my mouth. No time to entertain a bunch of nuts
Thank you for the support, that’s what really matter

If you have any doubts, just ask instead of believing rumors. My DMs are always open to everyone

~ Mona
Please open Telegram to view this post
VIEW IN TELEGRAM
2391🔥53🫡38🗿36🏆10👀108😈6😘6🥰3🙈3