ᴋᴀᴠɪ's ʙᴀᴄᴋᴜᴘ ✨🔮 – Telegram
ᴋᴀᴠɪ's ʙᴀᴄᴋᴜᴘ 🔮
146 subscribers
717 photos
3 videos
59 files
65 links
• Random Stuff by @kavi_00 🇱🇰
• Join @rogerbuilds 👻

• For Reports and Suggestions : @kavisfeedbackbot
Download Telegram
#RisingOS #ROM #Unofficial #Sakura #U
RisingOS v4.1 - UNOFFICIAL | Android 14
Release Date
: 01.08.2024
By : @obito_svha

▪️ Download [1.4 GB]
▪️ Screenshots
▪️
Changelogs

Notes:
• Signed build with private keys
• Core - GAPPS build
• Flash this if u need to Debloat a bit
• Encrypted ROM
• Flash DFE if you want to stay non-encrypted
• Use this or this recovery
• Found a bug? Tag me and Report in support group

Thanks to:
@GiovanniRN5 for device trees
@W1710N0 @k_y_c_i_i_9_1 for everything
@kavi_00 for SS & Debloater

Follow @Redmi6ProNews
Join @Redmi6Pro_Chat
👍2🔥2🥰1
Debloater_Rising.zip
929.8 KB
Debloater For RisingOS - Core

This removes some useless Gapps trash and make enough system space for Gboard etc.

1. Flash After Flashing the Rom
2. Use Nikgapps Addons
4👍1
SettingsServices.zip
4.7 MB
Settings Services for (A14)

This will add Search option for Settings Homepage in Vanilla or Gapps Roms. (Android 14 only)

1. Go to Recovery & Flash
3. Reboot System and Done

*** Can be used in any Vanilla or Gapps rom if U have the mentioned issue.


Join @kavisbackup
Small Gift for 100 Subs 😉
2🥰1
NothingWidget.apk
180 KB
NothingOS inspired Clock & Date Widget
For A12+ any ROM

Preview
Calendar Widget by @kavi_00
Clock Widget by OSXperience

Enjoy....

Join @kavisbackup
🔥41👍1🥰1
Forwarded from 𝗠𝗘𝗢𝗪 𝗗𝗨𝗠𝗣 (𝗠𝗘𝗢𝗪𝗻𝗮 💅)
⚠️Urgent: Phone Hacking Scam on Telegram - Malicious Magisk Module Warning

This scammer on Telegram [UID 1878505335] is spreading a dangerous Magisk module to hack/destroy phones and demand money. (stoplamers gang)
[See Screenshot 1- CHAT BETWEEN SCAMMER & VICTIM]


What Happened:
• [UID 7576386418] Victim Ganesh's phone was hacked via Scammer's module.
• Scammer demanded $100, threatening to destroy the phone if they didn't pay.
This guy alerted me to this scam.
I went undercover to investigate how it works
[See Screenshot 2- CHAT BETWEEN SCAMMER & Investigator] MUST READ


Here's how it went down:

There were only two things needed: "Zygisk" and the "virus module" (click to read more)

I was really surprised to find out it didn't even require a restart. Once you flashed it, it was basically done.

So I contacted the person and, pretending to be someone else, said I wanted to access my girlfriend's phone. I acted like a nibba & He seemed to believe my story and sent me the module.
To see how it works, I needed to install it. Instead of using the real module, I made two fake modules. I just copied module.prop file from his module, repacked it with my update binary, and flashed it using "kernel su".

The person was then trying to do things to my phone, but nothing was happening.😭🤣 I was just watching it and was really laughing hard because it wasn't working. Then he sent commands to run in the terminal, related to the service.sh file inside his module. Since I hadn’t installed the original module, the commands didn't do anything. He then seemed confused and started asking for my Android and kernel versions😂. Finally, he sent something I wouldn’t run as it was an obvious privacy concern. So, I've decided to just hold on to things for now since I have enough evidence
What Happens If You Flash This Module?:

• Scammer gets full access to your phone (data, messages, photos, chats etc.)
• Scammer can steal your data and money.
• Scammer can lock or destroy your phone. (he remotely destroyed victim's device making it unbootable)
• You will be blackmailed.

- Moral from this incident
• Do not flash modules from unknown sources
• Only use trusted modules.
• Be suspicious of free or "too good to be true" modules.
• Research modules before installing.

Stay safe and share this information with your friends to help stop these scams!

~ Regards // Mona
Please open Telegram to view this post
VIEW IN TELEGRAM
2