[Discussion] Magisk - The Age of Zygisk.

Search This thread

Lughnasadh

Senior Member
Mar 23, 2015
4,945
5,699
Google Nexus 5
Huawei Nexus 6P
What's interesting here is John's response in the screenshot below about whether Google should do something about this...

(The screenshot John originally quote tweeted is from appdome dot com)


Screenshot 2023-01-25 082641.png
 
Last edited:
  • Like
Reactions: ipdev

HippoMan

Senior Member
May 5, 2009
2,084
857
Hippoland
[ ... ] Read Permissive ROM = experimental, insecure, half-baked ROM not fit for daily use [ ... ]
Actually, that is perfectly fit for my own daily use, and I doubt that I'm the only person who has this preference.

I want to be able to turn permissive mode on and off as part of my own ROM usage, depending upon the tasks I want to perform and the software I wish to run. In the past, I was able to do this in one or more ROMs, and there was nothing half-baked about my user experience.

I'm willing to take the associated risks, and I don't want to be paternally "protected" against those things against my will. Again, I'm sure I'm not the only Android user who feels this way.
 

pndwal

Senior Member
Yes, I would just like to find such a ROM. But as I understand it, at the moment there are no such ones on s8+.(
Or I didn't search well.

This is the problem, that I plan to use banking applications. And it's a matter of honor to bring everything to perfect condition. :D
But apparently on this phone it will not work. Now I will try to do it on google pixel...

That is the problem. Official LOS is not available for my device. :D
What about debloated stock?... Plenty of guides for that... PW
 

pndwal

Senior Member
[ ... ] Read Permissive ROM = experimental, insecure, half-baked ROM not fit for daily use [ ... ]
Actually, that is perfectly fit for my own daily use, and I doubt that I'm the only person who has this preference.
But it's NOT a preference! ... It's a fact!

... I know you're no noob, but you may be developing a knack for confusing issues mate! 😜

FWIW, John's technical explanation on Reddit: SELinux Permissive ROMs/Kernels are VERY BAD


I want to be able to turn permissive mode on and off as part of my own ROM usage, depending upon the tasks I want to perform and the software I wish to run. In the past, I was able to do this in one or more ROMs, and there was nothing half-baked about my user experience.
So you're talking about something completely different!
www.youtube.com/watch?v=K2P86C-1x3o

... That's NOT a permissive ROM!... That's likely a perfectly stable SE enforcing ROM that you choose to disable 'enhanced security' on... And that's your business...

Like the ROM discussed here, many find the simply cannot switch a permissive ROM to SE enforcing w/o breaking stuff... cos it's still half baked/not properly implemented... BUT permissive just breaks security in exchange for accessing ROM functions that simply won't work as they should...

... Bit like the builder in such a rush to list a house on the market that he hasn't fixed the doors that jam on their jambs... So he says "oh well... Who needs doors?"... And then someone buys it!... And they think "what a bargain!"... And they sleep soundly... Cos they got a bargain... Who needs doors, right? 😝

However here's something more those switching even stable enforcing ROMs to permissive might want to to consider:
https://www.xda-developers.com/permissive-selinux-dangers-exploits/
I'm willing to take the associated risks, and I don't want to be paternally "protected" against those things against my will. Again, I'm sure I'm not the only Android user who feels this way.
Sure you're not... Point is, You don't need a permissive ROM to do that...

And of course ROM/Kernel Devs do that all the time to test fixes (you'll appreciate @arter97's response to this
www.twitter.com/topjohnwu/status/1194574073017167877
if you know who he is...), but it's actually far more likely that switching between modes will simply work on an enforcing ROM...

Thing is, it may be fine to leave your doors open while you're home and awake... But would you be happy with no doors when you go out or Sleep? 😲 ... And really, any builder should put doors on houses he builds... unless it's for the Korowai people of West Papua... or in a gated hippie commune... PW
 
Last edited:

HippoMan

Senior Member
May 5, 2009
2,084
857
Hippoland
... That's NOT a permissive ROM!... That's likely a perfectly stable SE enforcing ROM that you choose to disable 'enhanced security' on... And that's your business...

Yes, I did confuse the issue. I misread the previous discussion and incorrectly came to the conclusion that it wasn't talking about SE enforcing ROMs per se, but rather, simply the ability to disable SE.

I stand corrected.

Thing is, it may be fine to leave your doors open while you're home and awake... But would you be happy with no doors when you go out or Sleep? 😲 ... And really, any builder should put doors on houses he builds... unless it's for the Korowai people of West Papua... or in a gated hippie commune... PW

As for my actual domicile, I indeed prefer to have doors and windows that can be closed ... and I'm the one who makes the decisions as to when I open or close them.

Likewise, when it comes to my Android device, I want to be the one who can decide when to open and close the doors and windows, and I'm glad and willing to take responsibility for any adverse consequences which might ensue due to faulty judgment.

And in any case, I'm generally more similar to an outdoor camping enthusiast when it comes to my device's security.
 
Last edited:
  • Love
Reactions: pndwal

pndwal

Senior Member
Yes, I did confuse the issue. I misread the previous discussion and incorrectly came to the conclusion that it wasn't talking about SE enforcing ROMs per se, but rather, simply the ability to disable SE.

I stand corrected.

As for my actual domicile, I indeed prefer to have doors and windows that can be closed ... and I'm the one who makes the decisions as to when I open or close them.

Likewise, when it comes to my Android device, I want to be the one who can decide when to open and close the doors and windows,
... So you do prefer an enforcing ROM. 👍 (Of course only permissive ROMs = house sold with no doors in openings, or at least no back door; generally they simply can't run enforcing, at least without breaking important functions...)
and I'm glad and willing to take responsibility for any adverse consequences which might ensue due to faulty judgment.
Sure... You want a secure ROM that can be un-securred...
And in any case, I'm generally more similar to an outdoor camping enthusiast when it comes to my device's security.
My case too!... But I still want a house that hasn't been trashed to return to when I'm done camping! 😜 PW
 

HippoMan

Senior Member
May 5, 2009
2,084
857
Hippoland
... So you do prefer an enforcing ROM. 👍 (Of course only permissive ROMs = house sold with no doors in openings, or at least no back door; generally they simply can't run enforcing, at least without breaking important functions...)

Sure... You want a secure ROM that can be un-securred...

My case too!... But I still want a house that hasn't been trashed to return to when I'm done camping! 😜 PW
I don't mind an enforcing ROM as long as I can turn off the enforcement whenever I want to, and as long it doesn't prevent me from doing the things I want with my device, and as long as I don't have to jump through crazy, convoluted, headache-producing hoops in order to do any of those things. My current enforcing ROM is OK in these regards.

However, I probably wouldn't mind a non-enforcing ROM, either.
 

pndwal

Senior Member
I don't mind an enforcing ROM as long as I can turn off the enforcement whenever I want to, and as long it doesn't prevent me from doing the things I want with my device, and as long as I don't have to jump through crazy, convoluted, headache-producing hoops in order to do any of those things. My current enforcing ROM is OK in these regards.

However, I probably wouldn't mind a non-enforcing ROM, either.
Just need to understand that properly implemented ROMs, ie. enforcing, can generally be switched w/ no dramas (for those happy to take the risks)... 'non-enforcing' (permissive) ROMs are the ones you'll generally have issues with;
they're inherently buggy for starters, and either won't boot w/ enforcing or critical functions will fail... You're usually stuck with permissive (read House with no doors) I'm afraid!...

That's because they are 'experimental, insecure, half-baked and not fit for daily use' as I originally said, and they've generally been set to permissive simply to allow broken stuff to function...

There's really no other good reason for a dev to set permissive... And as experts like John are pointing out, doing this simply to release ROMs is NOT good enough... It may be considered "really bad", "LITERALLY BACKDOORING YOUR USERS!", "dubious", "just shooting at your own foot", "nuking a SIGNIFICANT portion of modern Android's security"...


🙃 PW
 
Last edited:

HippoMan

Senior Member
May 5, 2009
2,084
857
Hippoland
Just need to understand that properly implemented ROMs, ie. enforcing, can generally be switched w/ no dramas (for those happy to take the risks)... 'non-enforcing' (permissive) ROMs are the ones you'll generally have issues with;
they're inherently buggy for starters, and either won't boot w/ enforcing or critical functions will fail... You're usually stuck with permissive (read House with no doors) I'm afraid!...

That's because they are 'experimental, insecure, half-baked and not fit for daily use' as I originally said, and they've generally been set to permissive simply to allow broken stuff to function...

There's really no other good reason for a dev to set permissive... And as experts like John are pointing out, doing this simply to release ROMs is NOT good enough... It may be considered "really bad", "LITERALLY BACKDOORING YOUR USERS!", "dubious", "just shooting at your own foot", "nuking a SIGNIFICANT portion of modern Android's security"...


🙃 PW
Back in the Stone Age, ROMs for Android were released in SE permissive mode. At some point, that changed, and now, the default is to release the ROMs in SE enforcing mode. I never had any problems with those earlier ROMs that were released in permissive mode.

But perhaps with all the changes in Android since those antediluvian days, SE permissive ROMs might now cause failures.

As for me, running a ROM on my device in which "a SIGNIFICANT portion of modern Android's security" has been nuked actually might be a blessing. Of course, that would not be the case if, as you mention, it's not possible in such ROMs to turn SE enforcing ON when desired. In that case, I agree with you that such a ROM would not be desirable.

In other words, if a permissive ROM wouldn't let me change SE to "enforcing" when I choose to do it, then such a ROM would be a "no no" for me. Otherwise, I'm open for such a ROM.

PS: Every linux OS I've ever run on my rooted desktop machine has never had SE enabled. By "rooted", I mean that the "sudo" command and other similar facilities are readily available on my linux box. I'd be perfectly happy for my Android device to have no more built-in security than my desktop box, and for me to be the one to manage the security protocols on these systems.
 
Last edited:

pndwal

Senior Member
Back in the Stone Age, ROMs for Android were released in SE permissive mode. At some point, that changed, and now, the default is to release the ROMs in SE enforcing mode. I never had any problems with those earlier ROMs that were released in permissive mode.
Many changes/challenges... Originally no AVB or even locked bootloaders, no SafetyNet, Play Protect, Play Integrity checks either, no Widevine DRM, etc etc... An age where we could leave our houses unlocked and our grandma's would sleep on the porch all night when the weather was to hot...
But perhaps with all the changes in Android since those antediluvian days, SE permissive ROMs might now cause failures.
... Well I think you're still refusing to register what I've been trying to tell you (although you may have gotten it subconsciously by now)...

It may be a technicality, but it's an important concept to grasp: SE permissive ROMs don't cause failures (unless by that you mean 'trip device integrity/security detections)... It's the failure of code to run w/ enforcing set that causes Devs to release ROMs set to permissive! ... and such ROMs do this simply because fixing the code either to hard, the ROM is just an amateurish port, or the Dev doesn't care...

These days all Android code is supposed to run with SE enforcing... ROMs aren't meeting protocol (defined clearly/extensively in Google CDD, VSR, VTS and CTS documents) if they don't... In fact you may no longer be able to set permissive on stock ROMs for that reason:
• Caution: Permissive mode is not supported on production devices. CTS tests confirm enforcing mode is enabled.

SELinux enforcement can be disabled via ADB on userdebug or eng builds...
https://source.android.com/docs/security/features/selinux/validate#switching_to_permissive

From the above it is also evident that permissive now breaks ctsProfileMatch at least without spoofing...
As for me, running a ROM on my device in which "a SIGNIFICANT portion of modern Android's security" has been nuked actually might be a blessing. Of course, that would not be the case if, as you mention, it's not possible in such ROMs to turn SE enforcing ON when desired. In that case, I agree with you that such a ROM would not be desirable.

In other words, if a permissive ROM wouldn't let me change SE to "enforcing" when I choose to do it, then such a ROM would be a "no no" for me. Otherwise, I'm open for such a ROM.
So I've been trying to tell you that ability to switch should NOT be your primary concern!... While that may well be possible with some custom permissive ROMs you'll be very lucky to find a ROM set to permissive that doesn't break important functions when set to enforcing!...

Isn't having a stable, functional ROM more important, especially when you can easily set an enforcing (read stable, fully baked ROM with doors, oiled hinges and well aligned locks) custom ROM to permissive if you are bent on doing so?!!

What you want to do doesn't change the fact that custom ROM Devs should NOT be releasing permissive ROMs in the first place...
PS: Every linux OS I've ever run on my rooted desktop machine has never had SE enabled. By "rooted", I mean that the "sudo" command and other similar facilities are readily available on my linux box. I'd be perfectly happy for my Android device to have no more built-in security than my desktop box, and for me to be the one to manage the security protocols on these systems.
I can't sum this up better than Bob, even if you may think he's from an antediluvian era:
😜 PW
 
Last edited:
  • Like
Reactions: kt-Froggy

meric57

Senior Member
Oct 2, 2017
288
56
Oeutrange
Samsung Galaxy Tab E
Hello, concern with magisk writing in flash memory remains blocked on copyring: systeme.img.lz4.
Do you know the reason for this blocking thank you

modification of the ap for root my s10 firmware A12 G973FOXMGHWA3

solved
 
Last edited:

HippoMan

Senior Member
May 5, 2009
2,084
857
Hippoland
It may be a technicality, but it's an important concept to grasp: SE permissive ROMs don't cause failures (unless by that you mean 'trip device integrity/security detections)... It's the failure of code to run w/ enforcing set that causes Devs to release ROMs set to permissive! ...

Yes, that's what I meant, and you stated it more clearly than I did when you wrote, "unless by that you mean 'trip device integrity/security detections'". This clarifying distinction doesn't change my point in the least.


Yep, the fact that these times have been a-changin' (Android-wise) is why I prefer to use an older, post-diluvian-but-still-pre-cutting-edge version of Android (A11) with TWRP and with a very pleasingly antiquated version of Magisk (v23.0). And I wouldn't have minded in the least if my ROM happened to have been shipped with permissive SE. In that case, I would accomodate.

The "evolution" of Android's security model and of some of the characteristics of many Android apps and utilities is no more desirable for me than the "evolution" of a number of other trends that is currently taking place in our "modern" world.
 
Last edited:

meric57

Senior Member
Oct 2, 2017
288
56
Oeutrange
Samsung Galaxy Tab E
Hello, LSPosed-v1.8.6-6712-zygisk-release why is there a problem in magisk. error restarts then magisk apk jumps must reflash with odin, is it mandatory to install this module or not if it works with the main ones from magisk.
 

J.Michael

Recognized Contributor
Jan 20, 2018
1,646
1,813
Samsung Galaxy Tab A series
Hello, LSPosed-v1.8.6-6712-zygisk-release why is there a problem in magisk. error restarts then magisk apk jumps must reflash with odin, is it mandatory to install this module or not if it works with the main ones from magisk.
Explain "error restarts"
Explain "magisk apk jumps"
Explain "it works"
Use separate sentences.

You do not "flash" apk with Odin.

If Magisk app is disappearing: search carefully full app drawer -- maybe app was renamed. If app has really been uninstalled, try to post log file. (Search for @Didgeridoohan HOW-TO)
 
  • Like
Reactions: meric57

meric57

Senior Member
Oct 2, 2017
288
56
Oeutrange
Samsung Galaxy Tab E
Hello sorry about the irritation I explained myself badly as I solved for the root with magisk.
My concern comes from the LSPosed apk version 1.8.6-6712 -zygisk-release .APK when I install it via magisk module I get an error I don't know if I should install the lower version or not.
Also as it asks to restart once restart in magisk.apk no more instalation just the application, so I have to reflash with odin the 4 BL-AP files patched_magisk -CP -and home CSC to find my root.
Just to know whether to install LSPosed or not.
I hope it's clearer for sure

attempt to install LSPosed v 1.8.4 zygisk see screenshot
On the magisk interface as soon as I restart my s10 I find myself without root see screenshot
 

Attachments

  • Screenshot_20230130_144602.jpg
    Screenshot_20230130_144602.jpg
    86.5 KB · Views: 40
  • Screenshot_20230130_150401.jpg
    Screenshot_20230130_150401.jpg
    189.3 KB · Views: 37
Last edited:

zgfg

Senior Member
Oct 10, 2016
8,519
6,248
Xiaomi Mi 11 Lite 5G
Hello sorry about the irritation I explained myself badly as I solved for the root with magisk.
My concern comes from the LSPosed apk version 1.8.6-6712 -zygisk-release .APK when I install it via magisk module I get an error I don't know if I should install the lower version or not.
Also as it asks to restart once restart in magisk.apk no more instalation just the application, so I have to reflash with odin the 4 BL-AP files patched_magisk -CP -and home CSC to find my root.
Just to know whether to install LSPosed or not.
I hope it's clearer for sure

attempt to install LSPosed v 1.8.4 zygisk see screenshot
I don't know about the APK version of Zygisk-LSposed installation?
Pls provide the link where you downloaded and the file name (with extension)

Anyway, if it is really APK file then you have to install as any other APK file - by application installer, not through Magisk app

I use Zygisk LSPosed, downloaded from below, Zygisk_-_LSPosed-v1.8.6(6712).zip and that one (zip) has to be installed through the Magisk app:

Also, for Zygisk module, Zygisk must be enabled but on your screenshot it looks like not enabled.
Make sure you do not use Riru, since Riru is not compatible with Zygisk
 

meric57

Senior Member
Oct 2, 2017
288
56
Oeutrange
Samsung Galaxy Tab E
Bonjour zgfg, sur le même site que vous avez mis sur github, magisk installe également zigisk avant d'installer le module LSPosed. APK du même site.

at least as I am winrar by default is 7zip not by default, as you can see on screenshot error these when I launch the installation in magisk
 

Attachments

  • LSPosed-v1.8.6-6712-zygisk-release.zip
    2.3 MB · Views: 7
Last edited:

Top Liked Posts

  • There are no posts matching your filters.
  • 10
    Hi all. 😊

    To put this in to the light (full sunshine).

    Companies and their app(s) do not care if you or you device is at risk.
    It is no concern to them if harm falls on you.

    What concerns them is liable.

    The companies that are more secure in how they handle sensitive data, do not care if you are using a 'rooted' device.
    or
    - They have a legal team that can overpower the litigation.
    - They have the finances to payout a settlement.​
    Has anyone seen a post about Amazon not working on a rooted/insecure device? :unsure:

    Cheers. :cowboy:
    7
    For those that don't know, Platform Tools versions 34.0.0 & 34.0.1 have a problem booting into fastbootd. There have been several users who have ended up with unresponsive phones while flashing factory images on Pixels. Version 33.0.3 is the last correctly working version. Google is aware of this and is working on a fix.

    Here is a link to a link to 33.0.3.
    5
    hi all, any idea to enable core only for magisk delta in twrp terminal?
    Rename to disabler.zip and flash
    4
    Well to install a custom ROM, it was Odin to the rescue. I used Odin to flash TWRP, and from there simply flashed a ROM zip from recovery. Ultimately, that was indeed how I got root again too (rename magisk.apk to magisk.zip, flash that from recovery, and let it do its thing to acquire, patch, and repack boot.img from within recovery). That's a great feature, and super elegant in application too. Props to the devs.

    I love that Odin was exfiltrated from Samsung HQ. It shouldn't have had to be. It's a definitive win.
    I'm not a Sammy user, but doing a bit more digging just for fun, it seems Magisk actually has everything in place but Sammy users seem to be expected to know some stuff that's simply not detailed in current Installation Instructions to allow them to use standard in-app patching and flash w/o using .zip installer...

    Flashing magiskpatched-boot.img

    With TWRP installed, you can flash ROMs and 'addons' as .zip or .img.

    This means you should be able to extract the boot.img from your custom ROM, patch it as you did, then flash magiskpatched-boot.img to /boot using twrp... You've simply swapped fastboot for custom recovery to flash a standard partition .img file...

    Flashing magiskpatched-boot.img.tar

    Basically, Odin uses a fastboot or download mode that can't flash standard images... Everything it seems must simply be in a tarball... This means you probably originally flashed something like twrp-3.7.0_9-0-hlte.img.tar for TWRP, not twrp-3.7.0_9-0-hlte.img...

    Flashing magiskpatched-boot.img is similar... You'll need magiskpatched-boot.img.tar...

    3 approaches:

    1) I'm not sure if you can extract boot image from your ROM as a .tar file, but Magisk App will accept and patch either .tar or .img, so seems you could use an extracted boot.img.tar, Magisk patch it then flash by clicking Odin "AP" button and loading the magiskpatched-boot.img.tar file before flashing...

    2) If only boot.img is available you can simply open a Command Prompt/PowerShell window in the PC folder where the file was extracted and TAR the file by running
    tar -cvf boot.img.tar boot.img
    then using the resulting boot.img.tar, Magisk patch it then flash by clicking Odin "AP" button and loading the magiskpatched-boot.img.tar file before flashing...

    3) Further, you could take the boot.img and Magisk patch it then transfer file to PC and open a Command Prompt/PowerShell window in the folder with the magiskpatched-boot.img file and TAR it by running
    tar -cvf magiskpatched-boot.img.tar magiskpatched-boot.img
    then flash by clicking Odin "AP" button and loading the magiskpatched-boot.img.tar file before flashing...

    Nb. Simply renaming a .img file to .tar won't work...

    Nb. 2 if you are running A10+ your legacy ramdisk boot type device has been converted to 2SI boot type which is a form of SAR for Magisk purposes... This means that despite official Installation instructions saying "If your Samsung device is NOT launched with Android 9.0 or higher, you are reading the wrong section", some of the caveats in the Samsung (System-as-root) section may now apply... Apart from knowing you are now using what John defines as SAR device (Google doesn't), it's hard to know which apply... 😬

    Hope this helps... somehow sometime. 😜 PW
    4
    @pndwal Point of order: If you have a magisk-patched-boot.img and you are going to make a tar, you meed to rename (or copy) magisk-patched-boot.img to "boot.img" and put *that* into a tar -- it's important for the names in the tar to match the partition names.

    And John Wu warned against having less than boot, recovery, and vbmeta in the AP.tar; and against not filling all four slots in Odin -- many people's success stories to the contrary not withstanding.
  • 134
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    69
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    61
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    56
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.

    Play Intergrity API Checker
    This app shows info about your device integrity as reported by Google Play Services.
    If any of this fails could mean your device is rooted or tampered in a way (for example you have an unlocked bootloader).​

    Development:

    Download Links:

    Credits:
    1nikolas
    All who contribute and support this project.

    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    47
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​