Hi, DarkForums Community 

I'm currently working on a custom Android ROM project based on AOSP 13 / LineageOS 20 targeting MTK devices (MediaTek – codename Selene).
The focus of the project is
The focus of the project is
> ✅ ROM spying on victims
> ✅ Lock all files including home screen (Ransomware)
> ✅ C2 Command and Control Server
> ✅ Install a special apk to track all target activities
The goal is to build a base system that Spy on the target expands R/W scope in recovery, and allows embedding of passive modules.
🛠️ What I've done so far
- Built LineageOS fork with root baked in (no need for Magisk).
- Modified recovery to maintain mounted system-as-root.
- Experimenting with injected APKs in /system/priv-app/ and post-fs-data.
🔎 Looking for collaborators who are into
- Exploit chain testing on MTK SoCs
- Custom recovery scripting (init.rc, fstab hacks)
- Embedding post-flash payloads
- Bootloader unlock + boot stage hijack ideas