IzzyOnDroid Magisk Repository

IzzyOnDroid repoThis is a repository for open-source Magisk Modules which is run by by IzzyOnDroid (details), currently serving 139 modules. To add it to your MMRL client, use this URL:
 

https://apt.izzysoft.de/magisk

Note this repo is still in BETA stage, so there might be some glitches and not everything is working as planned yet! Further, other than with our F-Droid repo, there is no extensive scanning framework in place. Modules are taken in directly from their resp. developers.

Last updated: 2026-03-06 20:33 UTC

Dugor#6960.rar -

: Note if the malware attempts to access %AppData%\Discord\Local Storage\leveldb to steal authentication tokens.

: Record the file size, MD5/SHA-256 hashes, and compilation date. Dugor#6960.rar

: User extracts and runs the executable, often bypassing Windows Defender through obfuscation. : Note if the malware attempts to access

: Identify the file as a likely Token Logger or InfoStealer targeting Discord users. Dugor#6960.rar

The filename is strongly associated with malicious activities, particularly Discord-based credential theft and token logging . Files formatted this way (a name followed by a Discord tag) are commonly used by threat actors to distribute malware through direct messages or community servers.

139 modules found

: Note if the malware attempts to access %AppData%\Discord\Local Storage\leveldb to steal authentication tokens.

: Record the file size, MD5/SHA-256 hashes, and compilation date.

: User extracts and runs the executable, often bypassing Windows Defender through obfuscation.

: Identify the file as a likely Token Logger or InfoStealer targeting Discord users.

The filename is strongly associated with malicious activities, particularly Discord-based credential theft and token logging . Files formatted this way (a name followed by a Discord tag) are commonly used by threat actors to distribute malware through direct messages or community servers.

|« «
Modules per page: 10 25 50 100
» »|