[Discussion] Magisk - The Age of Zygisk.

Search This thread

Mr.Jlu

Member
Jun 2, 2016
39
24
Still haven't been able to do this on Xiaomi RN8T... Please say your device / OS... Thanks, PW
Hello @pndwal,

Device: Nord
Model: AC2001
Brand: OnePlus
Android: 11
ROM: [11.0.0_r46] AospExtended ROM v8.7 [OFFICIAL]

In my previous post, I mentioned that it only worked once, then stopped after a reboot.

As a result, I had a few sleepless nights over the weekend. I wanted to understand how the app could detect this. Finally this afternoon, I was able to bypass the detection.

My next post will describe the steps I followed because in this post your question was related to my device specifications.
 
  • Like
Reactions: pndwal

Mr.Jlu

Member
Jun 2, 2016
39
24
Hello Guys,

[UPDATE]

I was able to bypass the root detection of this app using the following magisk module but it stopped working post reboot.

Magisk Module Name: InitRcHider
Reference URL: XDA Download Link: https://forum.xda-developers.com/attachments/initrchider-zip.5472273/
Hello Guys,

I am back again. Finally, I found a way to bypass this app detection. My day was made after achieving this :giggle:.
Device: Nord
Model: AC2001
Brand: OnePlus
Android: 12
ROM: [12.1][UNOFFICIAL] LineageOS 19.1 - microG [OnePlus Nord/avicii]
  1. Pass the device integrity test by using publicly available methods for your device.
  2. The following is the list of the magisk modules installed on my device:
    • Zygisk - LSPosed [ v1.8.5(6649) ] Mandatory
    • Universal SafetyNet Fix [ v2.3.1 or any other] ~ Optional, used for passing safety net.
    • Shamiko [ v0.6 ] ~ Optional, used for passing basic root detection.
    • MagiskHide Props Config [ v6.1.2-v137 ] ~ Optional, used for passing safety net.
  3. The following LSPosed module should be installed and the module should be activated.
    • Hide My Applist [ 3.0.5-Beta-367 ]
Then open Hide My Applist and perform the following steps:
  1. Click on App manage
  2. Select your app. In my case, it was HDFC bank [ com.snapwork.hdfc ]
  3. Enable hide
  4. Set Work mode as Whitelist
  5. Toggle OFF the option Exclude system apps
  6. Select the following apps from Template config - additional apps visible
    • The app you want to hide ( In my case the app name is HDFC Bank )
    • Any 2 standard user apps ( Eg: Whatsapp, Gmail)
  7. Then click on the 3 dot menu and enable the Show system. In this section, you have to spend some time with your neurons, you have to select those apps which are a must for the App to function properly ( Eg: Phone calls, Network Manager, Key Chain, etc ) and also those apps which should normally be present in the non-rooted environment.
    • Below I have attached the list of apps I have selected in order for you to make sense of the seventh point.
  8. Once the above steps are completed, restart your phone once and test.
If you guys have any particular apps you want me to test with this method, please share the name and APK link from a trusted source (Eg: Aurora Store) in this thread. I will check it in my free time and post an update in this thread.

Screenshot_20221211-194225_Hide My Applist.png

Screenshot_20221211-194234_Hide My Applist.png

So long my friend, Until next time👋.

Hello @73sydney ,
The above steps can be included in your guide if you wish.
 
Last edited:
  • Like
Reactions: ipdev and beeshyams

click2abubakar

New member
Dec 11, 2022
4
5
I've a Galaxy S7 edge on latest stock firmware. Latest TWRP installed & rooted with Magisk 25.2.

Can't enable Zygisk (already tried rebooting multiple times)

Tried the latest Canary but same result, tried turning off Zygisk, re-enabling, rebooting but no luck.

Any help would be greatly appreciated in this regard.

Thanks.
 

73sydney

Senior Member
Hello Guys,

I am back again. Finally, I found a way to bypass this app detection. My day was made after achieving this :giggle:.
Device: Nord
Model: AC2001
Brand: OnePlus
Android: 12
ROM: [12.1][UNOFFICIAL] LineageOS 19.1 - microG [OnePlus Nord/avicii]
  1. Pass the device integrity test by using publicly available methods for your device.
  2. The following is the list of the magisk modules installed on my device:
    • Zygisk - LSPosed [ v1.8.5(6649) ] Mandatory
    • Universal SafetyNet Fix [ v2.3.1 or any other] ~ Optional, used for passing safety net.
    • Shamiko [ v0.6 ] ~ Optional, used for passing basic root detection.
    • MagiskHide Props Config [ v6.1.2-v137 ] ~ Optional, used for passing safety net.
  3. The following LSPosed module should be installed and the module should be activated.
    • Hide My Applist [ 3.0.5-Beta-367 ]
Then open Hide My Applist and perform the following steps:
  1. Click on App manage
  2. Select your app. In my case, it was HDFC bank [ com.snapwork.hdfc ]
  3. Enable hide
  4. Set Work mode as Whitelist
  5. Toggle OFF the option Exclude system apps
  6. Select the following apps from Template config - additional apps visible
    • The app you want to hide ( In my case the app name is HDFC Bank )
    • Any 2 standard user apps ( Eg: Whatsapp, Gmail)
  7. Then click on the 3 dot menu and enable the Show system. In this section, you have to spend some time with your neurons, you have to select those apps which are a must for the App to function properly ( Eg: Phone calls, Network Manager, Key Chain, etc ) and also those apps which should normally be present in the non-rooted environment.
    • Below I have attached the list of apps I have selected in order for you to make sense of the seventh point.
  8. Once the above steps are completed, restart your phone once and test.
If you guys have any particular apps you want me to test with this method, please share the name and APK link from a trusted source (Eg: Aurora Store) in this thread. I will check it in my free time and post an update in this thread.

View attachment 5782549
View attachment 5782551
So long my friend, Until next time👋.

Hello @73sydney ,
The above steps can be included in your guide if you wish.

I would think whitelist mode would be the longest way around the issue, its been tested and working in blacklist mode, which requires selecting just the app and applying the root template to hide it from all the root related apps

If youre unable to pass it this way, assuming you have HMA setup as the guide suggests, then by all means let me know and ill consider adding it, but id rather not start adding one off solutions using a completely opposite mode (whitelist) which might only add to confusion, if the prescribed blacklist mode works

Also is MagiskHide Props Config needed?, if using Displaxs USNF mod 2.0 generally it shouldnt be required
 

pndwal

Senior Member
I've a Galaxy S7 edge on latest stock firmware. Latest TWRP installed & rooted with Magisk 25.2.

Can't enable Zygisk (already tried rebooting multiple times)

Tried the latest Canary but same result, tried turning off Zygisk, re-enabling, rebooting but no luck.

Any help would be greatly appreciated in this regard.

Thanks.
Re. Galaxy S7 Edge:

So you'll need custom, ported, fixed or newer Kernel; please check kernel version in use and read this pinned issue:
[Wontfix] Zygisk cannot activate on some old Samsung devices with old kernel (3.19-) #5395

Basically, Zygisk was not turning in for S8 and earlier Sammy phones:
https://github.com/topjohnwu/Magisk/issues/5353

The issue was fixed here (by Shana) for most:
https://github.com/topjohnwu/Magisk/pull/5372
Merged:
https://github.com/topjohnwu/Magisk/commit/ff7ac582f013dbc27b27e4194424044ee79c3980

This fix worked around broken system calls (due to kernel restriction / exec limitation), but requires fexecve, and unfortunately this doesn't exist in 3.19- kernels. 😕

Nb. Some devices w/ 3.19- kernels successfully load Zygisk without fexecve workaround. As Canyie said there:
It depends on was Samsung added their stupid exec limitation in the kernel of your device, or not. If Zygisk works on your device, just enjoy it. This is just a notice which points out Zygisk bug reports from Samsung devices using old kernels will be ignored.

Nb. I see this was fixed in LOS 18.1+ using 3.18.140 kernel... Could be a good choice...
- https://github.com/topjohnwu/Magisk/issues/5395#issuecomment-1073746347

👀 PW
 

click2abubakar

New member
Dec 11, 2022
4
5
Re. Galaxy S7 Edge:

So you'll need custom, ported, fixed or newer Kernel; please check kernel version in use and read this pinned issue:
[Wontfix] Zygisk cannot activate on some old Samsung devices with old kernel (3.19-) #5395

Basically, Zygisk was not turning in for S8 and earlier Sammy phones:
https://github.com/topjohnwu/Magisk/issues/5353

The issue was fixed here (by Shana) for most:
https://github.com/topjohnwu/Magisk/pull/5372
Merged:
https://github.com/topjohnwu/Magisk/commit/ff7ac582f013dbc27b27e4194424044ee79c3980

This fix worked around broken system calls (due to kernel restriction / exec limitation), but requires fexecve, and unfortunately this doesn't exist in 3.19- kernels. 😕

Nb. Some devices w/ 3.19- kernels successfully load Zygisk without fexecve workaround. As Canyie said there:


Nb. I see this was fixed in LOS 18.1+ using 3.18.140 kernel... Could be a good choice...
- https://github.com/topjohnwu/Magisk/issues/5395#issuecomment-1073746347

👀 PW
Thank you very much for the respons & confirmation. I pretty much figured out the same after googling for some time.

I have to use the Stock firmware, the only working solution I got to is to use the last Magisk released witout Zygisk.

Magisk 23 working fine for me, & am able to do hide root from banking & other apps.

Thanks once again.
 
  • Like
Reactions: ipdev and pndwal

pndwal

Senior Member
Thank you very much for the respons & confirmation. I pretty much figured out the same after googling for some time.

I have to use the Stock firmware, the only working solution I got to is to use the last Magisk released witout Zygisk.

Magisk 23 working fine for me, & am able to do hide root from banking & other apps.

Thanks once again.
Why can't you use current Magisk w/o Zygisk?... And please say why you need stock ROM... PW
 
  • Like
Reactions: J.Michael

click2abubakar

New member
Dec 11, 2022
4
5
Why can't you use current Magisk w/o Zygisk?... And please say why you need stock ROM... PW
I would need to hide Magisk from certain banking apps.

Can that be done without Zygisk in the current version?

I'd have loved to be on newer custom ROMs, but unfortunately after water damage, board (or something similar) had to be changed in my mobile phone. Although it shows my IMEI same as on my box, but IMEI has to be patched for the SIM to work.
The IMEI patch doesn't seem to work with custom ROMs. That's why I believe am stuck with stock firmware on this mobile.
 
  • Like
Reactions: ipdev

zgfg

Senior Member
Oct 10, 2016
8,519
6,248
Xiaomi Mi 11 Lite 5G
I would need to hide Magisk from certain banking apps.

Can that be done without Zygisk in the current version?

I'd have loved to be on newer custom ROMs, but unfortunately after water damage, board (or something similar) had to be changed in my mobile phone. Although it shows my IMEI same as on my box, but IMEI has to be patched for the SIM to work.
The IMEI patch doesn't seem to work with custom ROMs. That's why I believe am stuck with stock firmware on this mobile.
There are zillions of posts how to attempt hiding the 'root', and it works for most of the banking and similar apps

In very short (I will not guide further bcs all that was really covered in so many posts - who is really interested should have search and read, even before asking), Zygisk, DenyList (not enforced), Shamiko, USNF mode, LSPosed + Hide My Apps

However, there is NO generic way that works for ALL banking apps. But one must try with this - and/or search in the posts for the particular app, does it require something more (like using Magisk Delta instead of TJW Magisk).or even something less complicated, or currently it's not broken yet
 
  • Like
Reactions: 73sydney and ipdev

J.Michael

Recognized Contributor
Jan 20, 2018
1,646
1,815
Samsung Galaxy Tab A series
I would need to hide Magisk from certain banking apps.

Can that be done without Zygisk in the current version?

I'd have loved to be on newer custom ROMs, but unfortunately after water damage, board (or something similar) had to be changed in my mobile phone. Although it shows my IMEI same as on my box, but IMEI has to be patched for the SIM to work.
The IMEI patch doesn't seem to work with custom ROMs. That's why I believe am stuck with stock firmware on this mobile.
Can you try installing the OS @pndwal suggested? And just return to stock if it doesn't work?

If you are not in a position to restore the current, working, system when a modification attempt fails, then you should not be trying to install Magisk.
 

pndwal

Senior Member
I would need to hide Magisk from certain banking apps.

Can that be done without Zygisk in the current version?
Well you've got a point... w/o Zygisk-USNF you'd generally need Google Play Services droidguard process (aka SafetyNet process), com.google.android.gms.unstable, in denylist, and this requires working Zygisk too, as does using denylist as hidelist w/ Shamiko or DenylistUnmount modules... So we're gonna need something unusual...

Seems this module may be the answer:
https://github.com/HuskyDG/safetynet-integrity-fix

You don't need most of this modules functionality (fallback to basic attestation trigger and hardware verdict enforcement bypass triggers) as you don't have have a Hardware KA capable device... You do need an alternative to gms droidguard (SafetyNet) process in denylist however, and it seems this fork of USNF does/can hide root from this process itself (just like official zy-USNF) using Riru framework...

I'm guessing it should run (assuming you have Android 8) and fix SafetyNet and Play Integrity deviceIntegrity w/ Riru module installed for framework...

So the long answer is Yes, it probably can be done...
I'd have loved to be on newer custom ROMs, but unfortunately after water damage, board (or something similar) had to be changed in my mobile phone. Although it shows my IMEI same as on my box, but IMEI has to be patched for the SIM to work.
The IMEI patch doesn't seem to work with custom ROMs. That's why I believe am stuck with stock firmware on this mobile.
That's interesting... W/ new main board you'd have new IMEI number(s), S/N, and several other unique numbers, and these should simply work... I'm not understanding something here....

Do you mean no. on box for part, or for original phone?... Are you trying to use your original IMEI no. (numbers plural if dual SIM) for some reason?...

Can you give more info on what this patch does?... Can you link documentation for it?

Ta... 🙂 PW
 
  • Like
Reactions: ipdev

click2abubakar

New member
Dec 11, 2022
4
5
Well you've got a point... w/o Zygisk-USNF you'd generally need Google Play Services droidguard process (aka SafetyNet process), com.google.android.gms.unstable, in denylist, and this requires working Zygisk too, as does using denylist as hidelist w/ Shamiko or DenylistUnmount modules... So we're gonna need something unusual...

Seems this module may be the answer:
https://github.com/HuskyDG/safetynet-integrity-fix

You don't need most of this modules functionality (fallback to basic attestation trigger and hardware verdict enforcement bypass triggers) as you don't have have a Hardware KA capable device... You do need an alternative to gms droidguard (SafetyNet) process in denylist however, and it seems this fork of USNF does/can hide root from this process itself (just like official zy-USNF) using Riru framework...

I'm guessing it should run (assuming you have Android 8) and fix SafetyNet and Play Integrity deviceIntegrity w/ Riru module installed for framework...

So the long answer is Yes, it probably can be done...

That's interesting... W/ new main board you'd have new IMEI number(s), S/N, and several other unique numbers, and these should simply work... I'm not understanding something here....

Do you mean no. on box for part, or for original phone?... Are you trying to use your original IMEI no. (numbers plural if dual SIM) for some reason?...

Can you give more info on what this patch does?... Can you link documentation for it?

Ta... 🙂 PW

For now I have everything woring fine with Magisk 23 installed.
It's a fairly old device, & so I believe that shouldn't be an issue though.

And as for the IMEI Patch, I'm not really sure what had to be changed in my mobile phone to get it working again.
I had a dual SIM Galaxy S7 edge (SM-G935FD), but after the repair work I've a Single SIM mobile (SM-G935F). The IMEI no. was the same as it was for the SIM Slot 1.
I've done a clean install using Odin, with NAND Erase & re-partitioning using the PIT file. The IMEI no. shows up fine when checked through *#06# or the Settings.
But the IMEI status is "NG" if checked using the code *#0011#. For the SIM to be working I've to root my phone & have a "IMEI Patch" done using a box/dongle (Z3X I believe).

Now I don't have that & for every time I've to get the IMEI patch I've to pay up a small amount. I've already got that done 4 times now :p
Once with the original FW, then with LOS 19.1 (which didn't work), & then I reverted back to stock & rooted using the latest Magisk, but as with that the root hide didn't seem to be working, I had to go for Magisk 23 & then get it patched one last time.

And as of now this config. is working fine. I'm a little disappointed that I won't be able to flash my phone with a newer Custom ROM as then my SIM slot stops working. I couldn't find any info for such a case where such IMEI Patch has to be done & Custom ROM installation.
 
  • Like
  • Love
Reactions: ipdev and pndwal

pndwal

Senior Member
For now I have everything woring fine with Magisk 23 installed.
It's a fairly old device, & so I believe that shouldn't be an issue though.

And as for the IMEI Patch, I'm not really sure what had to be changed in my mobile phone to get it working again.
I had a dual SIM Galaxy S7 edge (SM-G935FD), but after the repair work I've a Single SIM mobile (SM-G935F). The IMEI no. was the same as it was for the SIM Slot 1.
I've done a clean install using Odin, with NAND Erase & re-partitioning using the PIT file. The IMEI no. shows up fine when checked through *#06# or the Settings.
But the IMEI status is "NG"
Do you mean N/A?
if checked using the code *#0011#. For the SIM to be working I've to root my phone & have a "IMEI Patch" done using a box/dongle (Z3X I believe).

Now I don't have that & for every time I've to get the IMEI patch I've to pay up a small amount. I've already got that done 4 times now :p
Once with the original FW, then with LOS 19.1 (which didn't work), & then I reverted back to stock & rooted using the latest Magisk, but as with that the root hide didn't seem to be working, I had to go for Magisk 23 & then get it patched one last time.

And as of now this config. is working fine. I'm a little disappointed that I won't be able to flash my phone with a newer Custom ROM as then my SIM slot stops working. I couldn't find any info for such a case where such IMEI Patch has to be done & Custom ROM installation.
Thanks for clarifying... Very interesting repair, especially as Sim can't work with stock setup or without root... Take it it's done by a non-official repair techie...

Seems it's not a full repair and he/she had to work around damaged hardware; guess patch is to bypass bad Sim slot & spoof SM-G935F model (using an IMEI modification) to allow remaining slot to work... Could be more to it too...

I'd be looking to upgrade to newer device, but I understand you've invested a lot in that one... 🙃 PW
 
  • Like
Reactions: ipdev

Top Liked Posts

  • There are no posts matching your filters.
  • 10
    Hi all. 😊

    To put this in to the light (full sunshine).

    Companies and their app(s) do not care if you or you device is at risk.
    It is no concern to them if harm falls on you.

    What concerns them is liable.

    The companies that are more secure in how they handle sensitive data, do not care if you are using a 'rooted' device.
    or
    - They have a legal team that can overpower the litigation.
    - They have the finances to payout a settlement.​
    Has anyone seen a post about Amazon not working on a rooted/insecure device? :unsure:

    Cheers. :cowboy:
    7
    For those that don't know, Platform Tools versions 34.0.0 & 34.0.1 have a problem booting into fastbootd. There have been several users who have ended up with unresponsive phones while flashing factory images on Pixels. Version 33.0.3 is the last correctly working version. Google is aware of this and is working on a fix.

    Here is a link to a link to 33.0.3.
    5
    hi all, any idea to enable core only for magisk delta in twrp terminal?
    Rename to disabler.zip and flash
    4
    Well to install a custom ROM, it was Odin to the rescue. I used Odin to flash TWRP, and from there simply flashed a ROM zip from recovery. Ultimately, that was indeed how I got root again too (rename magisk.apk to magisk.zip, flash that from recovery, and let it do its thing to acquire, patch, and repack boot.img from within recovery). That's a great feature, and super elegant in application too. Props to the devs.

    I love that Odin was exfiltrated from Samsung HQ. It shouldn't have had to be. It's a definitive win.
    I'm not a Sammy user, but doing a bit more digging just for fun, it seems Magisk actually has everything in place but Sammy users seem to be expected to know some stuff that's simply not detailed in current Installation Instructions to allow them to use standard in-app patching and flash w/o using .zip installer...

    Flashing magiskpatched-boot.img

    With TWRP installed, you can flash ROMs and 'addons' as .zip or .img.

    This means you should be able to extract the boot.img from your custom ROM, patch it as you did, then flash magiskpatched-boot.img to /boot using twrp... You've simply swapped fastboot for custom recovery to flash a standard partition .img file...

    Flashing magiskpatched-boot.img.tar

    Basically, Odin uses a fastboot or download mode that can't flash standard images... Everything it seems must simply be in a tarball... This means you probably originally flashed something like twrp-3.7.0_9-0-hlte.img.tar for TWRP, not twrp-3.7.0_9-0-hlte.img...

    Flashing magiskpatched-boot.img is similar... You'll need magiskpatched-boot.img.tar...

    3 approaches:

    1) I'm not sure if you can extract boot image from your ROM as a .tar file, but Magisk App will accept and patch either .tar or .img, so seems you could use an extracted boot.img.tar, Magisk patch it then flash by clicking Odin "AP" button and loading the magiskpatched-boot.img.tar file before flashing...

    2) If only boot.img is available you can simply open a Command Prompt/PowerShell window in the PC folder where the file was extracted and TAR the file by running
    tar -cvf boot.img.tar boot.img
    then using the resulting boot.img.tar, Magisk patch it then flash by clicking Odin "AP" button and loading the magiskpatched-boot.img.tar file before flashing...

    3) Further, you could take the boot.img and Magisk patch it then transfer file to PC and open a Command Prompt/PowerShell window in the folder with the magiskpatched-boot.img file and TAR it by running
    tar -cvf magiskpatched-boot.img.tar magiskpatched-boot.img
    then flash by clicking Odin "AP" button and loading the magiskpatched-boot.img.tar file before flashing...

    Nb. Simply renaming a .img file to .tar won't work...

    Nb. 2 if you are running A10+ your legacy ramdisk boot type device has been converted to 2SI boot type which is a form of SAR for Magisk purposes... This means that despite official Installation instructions saying "If your Samsung device is NOT launched with Android 9.0 or higher, you are reading the wrong section", some of the caveats in the Samsung (System-as-root) section may now apply... Apart from knowing you are now using what John defines as SAR device (Google doesn't), it's hard to know which apply... 😬

    Hope this helps... somehow sometime. 😜 PW
    4
    @pndwal Point of order: If you have a magisk-patched-boot.img and you are going to make a tar, you meed to rename (or copy) magisk-patched-boot.img to "boot.img" and put *that* into a tar -- it's important for the names in the tar to match the partition names.

    And John Wu warned against having less than boot, recovery, and vbmeta in the AP.tar; and against not filling all four slots in Odin -- many people's success stories to the contrary not withstanding.
  • 134
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    69
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    61
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    56
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.

    Play Intergrity API Checker
    This app shows info about your device integrity as reported by Google Play Services.
    If any of this fails could mean your device is rooted or tampered in a way (for example you have an unlocked bootloader).​

    Development:

    Download Links:

    Credits:
    1nikolas
    All who contribute and support this project.

    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    47
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​