This is a repository for open-source Magisk Modules which is run by by IzzyOnDroid (details), currently serving 139 modules. To add it to your MMRL client, use this URL:
https://apt.izzysoft.de/magisk
Note this repo is still in BETA stage, so there might be some glitches and not everything is working as planned yet! Further, other than with our F-Droid repo, there is no extensive scanning framework in place. Modules are taken in directly from their resp. developers.
Last updated: 2026-03-06 20:33 UTC
: Note if the malware attempts to access %AppData%\Discord\Local Storage\leveldb to steal authentication tokens.
: Record the file size, MD5/SHA-256 hashes, and compilation date. Dugor#6960.rar
: User extracts and runs the executable, often bypassing Windows Defender through obfuscation. : Note if the malware attempts to access
: Identify the file as a likely Token Logger or InfoStealer targeting Discord users. Dugor#6960.rar
The filename is strongly associated with malicious activities, particularly Discord-based credential theft and token logging . Files formatted this way (a name followed by a Discord tag) are commonly used by threat actors to distribute malware through direct messages or community servers.
: Note if the malware attempts to access %AppData%\Discord\Local Storage\leveldb to steal authentication tokens.
: Record the file size, MD5/SHA-256 hashes, and compilation date.
: User extracts and runs the executable, often bypassing Windows Defender through obfuscation.
: Identify the file as a likely Token Logger or InfoStealer targeting Discord users.
The filename is strongly associated with malicious activities, particularly Discord-based credential theft and token logging . Files formatted this way (a name followed by a Discord tag) are commonly used by threat actors to distribute malware through direct messages or community servers.