IzzyOnDroid Magisk Repository

IzzyOnDroid repoThis is a repository for open-source Magisk Modules which is run by by IzzyOnDroid (details), currently serving 139 modules. To add it to your MMRL client, use this URL:
 

https://apt.izzysoft.de/magisk

Note this repo is still in BETA stage, so there might be some glitches and not everything is working as planned yet! Further, other than with our F-Droid repo, there is no extensive scanning framework in place. Modules are taken in directly from their resp. developers.

Last updated: 2026-03-06 20:33 UTC

Filter:  
Category
License
AntiFeatures
Added since
Updated since
LastBuild since
Do it!
Clear clean
139 modules found

Cut3iew@tchingothers - Copy.rar Apr 2026

Do you know the of the file (e.g., a specific phishing campaign or a forensics CTF challenge)?

: RAR files with unusual characters (@) are a common delivery method for stealers that exfiltrate browser passwords and crypto wallets. Cut3ieW@tchingOthers - Copy.rar

: Filenames using "WatchingOthers" often correlate with spyware like Agent Tesla , AsyncRAT , or Remcos . Reading a deep-dive paper on these families from Mandiant or CrowdStrike will likely describe the exact techniques used by the archive you have. Do you know the of the file (e

: If you possess the sample, you can find behavioral reports on platforms like ANY.RUN or Joe Sandbox . These "papers" (technical reports) detail the file's network connections, registry changes, and process injections. Reading a deep-dive paper on these families from

Currently, there are no specific academic or public white papers indexed under that exact filename. However, if you are looking for a "good paper" to understand the technical context of such a file, you should focus on the following categories of analysis typically performed on these types of samples: Recommended Technical Resources

: If you have the file's SHA-256 hash, searching for that on VirusTotal will provide a community-vetted analysis of its behavior. To help me find the specific analysis or "paper" you need: Can you provide the SHA-256 hash of the file?

: Security blogs such as SANS Internet Storm Center or Malware-Traffic-Analysis.net frequently publish "PCAP" and "Forensic" papers on recent .rar-based email campaigns. Security Warning If you found this file on your system or in an email:

|« «
Modules per page: 10 25 50 100
» »|