[Discussion] Magisk - The Age of Zygisk.

Search This thread

zgfg

Senior Member
Oct 10, 2016
8,557
6,282
Xiaomi Mi 11 Lite 5G
Does this also mean that it is wrong to flash the magisk_patched.img into both slots?
My device is Poco F4 with A/B partitions.

wrong ? source
fastboot flash boot_a magisk_patched.img
fastboot flash boot_b magisk_patched.img

right ?
fastboot flash boot magisk_patched.img
Are you sure that your inactive slot is bootable (on some devices and ROMs it is not)?

Eg:
fastboot --set-active=b
fastboot reboot


Keep your OTA to switch/manage active slots, flashing with
fastboot flash boot <img>
will flash to the correct (active) one

Even if the other slot is bootable, at the moment it may not be updated to the same ROM version - flashing the wrong boot img there will make it not bootable
 
Last edited:
You helped me a lot to understand it. Thank you so much @zgfg & @pndwal (y)

My hopefully last question: To update the ROM + keep recovery and root installed, is this the right order?
- boot into recovery
- flash new ROM.zip
- flash recovery + new magisk_patched.img again (to keep it after next boot)
- reboot to system

When I only update TWRP/Orangefox, it is also necessary to flash again magisk_patched.img afterwards, because both are in boot partition, right?
 
  • Like
Reactions: ipdev and pndwal

pndwal

Senior Member
Does this also mean that it is wrong to flash the magisk_patched.img into both slots?
My device is Poco F4 with A/B partitions.

wrong ? source
fastboot flash boot_a magisk_patched.img
fastboot flash boot_b magisk_patched.img

right ?
fastboot flash boot magisk_patched.img
Generally you'd only flash Magisk to inactivate slot immediately after updating OS and before reboot following these instructions:
https://github.com/topjohnwu/Magisk/blob/master/docs/ota.md#devices-with-ab-partitions
for preserving Magisk thru updates... This method works for some devices, but is broken for current P6 and P7 updates ATM, so many A/B devices must flash only to current slot after updating and rebooting like A-only devices ...

I guess you could flash Magisk to inactive slot in other circumstances if not affected by recently implemented partition digest checks that prevent this from working on newer devices currently, as long as you know exactly which OS version is on that slot... It generally won't match the current slot so boot.img used will differ... Nb. When devices are new, the unused slot is not generally bootable as factory odex files for system apks are shipped on system_b
https://forum.xda-developers.com/t/...7-pro-cheetah-safetynet.4502805/post-87591713

Many users want to put an OS on both slots immediately for safety reasons, and in this case there may be identical systems and partitions incl. boot.img. However flashing to inactive slot can be fraught and can break updates, so why not simply swap active slots to install Magisk while slot is marked as active to have root on both slots?... Then change active slot back... PW
 

zgfg

Senior Member
Oct 10, 2016
8,557
6,282
Xiaomi Mi 11 Lite 5G
You helped me a lot to understand it. Thank you so much @zgfg & @pndwal (y)

My hopefully last question: To update the ROM + keep recovery and root installed, is this the right order?
- boot into recovery
- flash new ROM.zip
- flash recovery + new magisk_patched.img again (to keep it after next boot)
- reboot to system

When I only update TWRP/Orangefox, it is also necessary to flash again magisk_patched.img afterwards, because both are in boot partition, right?
If you are on Xiaomi.eu (recovery) ROMs, then TWRP or OFox will be already in the boot.img, hence you will just patch and flash the Magisk

In case of stock MIUI you can install OFox upon OTA upgrading, reboot to OFox, backup your Boot partition, then reboot to (not yet rooted) System, patch the backed-up boot.emc.win, then reboot to OFox and flash it to Boot (or flash from Fastboot)

Or, OTA, then install OFox, reboot to OFox and flash Magisk directly from OFox

(Btw, your inactive slot might really be not bootable with MIUI 13+

Also, if you first patch Magisk and then install TWRP/OFox to your device with Recovery integrated to the Boot, you will loose Magisk and you will have to patch the Magisk again)
 
Last edited:

shoey63

Recognized Contributor
I use payload-dumper. You cannot select only a single img file to extract but you can kill it once it extracts what you needed
I use Payload dumper go by @osm0sis .
It's a Magisk module and you can extract specific partitions from payload.bin on device without unpacking the whole thing.
Really handy👍
 

rseiler

Senior Member
Jun 24, 2012
273
88
[Metro Bank] Work fine, i can go into login screen

Via which method (there are a million of them)? I'm just using what's worked for everything else I use, which is:
-Magisk 25.2 (Zygisk, Denylist enforced and various apps checked, and using the Hide feature) + kdrag0n's safetynet-fix 2.4.0 module + Airfrozen

Using LineageOS 20.
 

J.Michael

Recognized Contributor
Jan 20, 2018
1,652
1,830
Samsung Galaxy Tab A series
Does it really work satisfactory on the phone when extracting from payload.bin of 9+ GB?

That's the reason I prefer PC
Plus, it sounds like you need Magisk installed, so you can use a Magisk module to extract a file you need to install Magisk. Possibly useful if using one phone as a workstation to install Magisk on another phone.
 
  • Like
Reactions: zgfg

zgfg

Senior Member
Oct 10, 2016
8,557
6,282
Xiaomi Mi 11 Lite 5G
Plus, it sounds like you need Magisk installed, so you can use a Magisk module to extract a file you need to install Magisk. Possibly useful if using one phone as a workstation to install Magisk on another phone.
There is still a case when you already have Magisk prior to OTA and you want to extract boot img on the same phone before patching, upgrading the ROM and flashing the patched boot.img

Btw, in that case you could also use.ADB & Fastboot Magisk module on that 'workstation' phone, to run ADB and/or Fastboot from that phone instead of from the PC (it works fine over the two-side USB-c cable)
 
Last edited:
  • Like
Reactions: J.Michael

Lughnasadh

Senior Member
Mar 23, 2015
4,950
5,709
Google Nexus 5
Huawei Nexus 6P
Generally you'd only flash Magisk to inactivate slot immediately after updating OS and before reboot following these instructions:
https://github.com/topjohnwu/Magisk/blob/master/docs/ota.md#devices-with-ab-partitions
for preserving Magisk thru updates... This method works for some devices, but is broken for current P6 and P7 updates ATM, so many A/B devices must flash only to current slot after updating and rebooting like A-only devices ...
I've seen several people say they successfully updated via "Install to Inactive Slot" method on the Pixel 6 and 7 series in the last several months, but it's still very hit or miss. A few issues concerning this matter have been opened (and closed) in the Magisk Github, but so far no one has provided logs, so until then the reasons for the hit or miss remain unknown.
 
Last edited:
  • Like
Reactions: ipdev

wkn000

Senior Member
Jan 19, 2017
128
62
Installed Magisk.zip with TWRP on LOS 20 (payton). No need to manually reinstall Magisk after any OTA since, all done automatically in background (addons.d).
 

pndwal

Senior Member
I've seen several people say they successfully updated via "Install to Inactive Slot" method on the Pixel 6 and 7 series in the last several months, but it's still very hit or miss. A few issues concerning this matter have been opened (and closed) in the Magisk Github, but so far no one has provided logs, so until then the reasons for the hit or miss remain unknown.
That's interesting...

This was broken for Pixel 6 and 7 at least for late A12 and A13 updates due to new partition digest checking by update engine... The linked Google documentation doesn't seem to have changed... Still says:
Once the user reboots the system, it will boot into the updated partition and it is marked as active. At this point, after the reboot, the update_verifier program runs, read all dm-verity devices to make sure the partitions aren't corrupted, then mark the update as successful.
... This new check was identified as the issue because boot.img partition digest doesn't match after Magisk flashing so dm-verity devices indicate corrupt boot image and update/slot will be marked as failed/corrupted... I believe disabling verity/verification can't help since vbmeta can't be tampered for delta updates using update engine either...

I mentioned this here:
https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-87762979

The issue is still marked in GitHub as wontfix...

Do you know if Google has in fact changed/reverted their digest checks, or if this actually works w/ up-to-date releases for some?... And perhaps you could link a user's success story?... Thanks, PW
 

pndwal

Senior Member
Installed Magisk.zip with TWRP on LOS 20 (payton). No need to manually reinstall Magisk after any OTA since, all done automatically in background (addons.d).
Yup, @osm0sis is trying to keep this working/as is (it's his handiwork/baby after all), but Magisk Devs have in mind to remove addon.d:
https://github.com/topjohnwu/Magisk/issues/3820#issuecomment-1364700096

Shana has produced a POC addon.d module:
https://github.com/topjohnwu/Magisk/issues/3820#issuecomment-1364699640

It remains to be seen how such module support will work for custom ROM users or how long native addon.d will stay, but hopefully all @osm0sis' code/work can be retained/keep working for LineageOS users etc as before...

👀 PW
 
  • Like
  • Sad
Reactions: ipdev and osm0sis

shoey63

Recognized Contributor
Does it really work satisfactory on the phone when extracting from payload.bin of 6+ GB?

That's the reason I prefer PC
Takes about 20 seconds for 2.9 GB
Screenshot_20230203-165323.jpg

Plus, it sounds like you need Magisk installed, so you can use a Magisk module to extract a file you need to install Magisk. Possibly useful if using one phone as a workstation to install Magisk on another phone.
True that.
Totally useless if you have only one unrooted phone😊
However, the pc version should do the same, without bothering with python.
 

Lughnasadh

Senior Member
Mar 23, 2015
4,950
5,709
Google Nexus 5
Huawei Nexus 6P
That's interesting...

This was broken for Pixel 6 and 7 at least for late A12 and A13 updates due to new partition digest checking by update engine... The linked Google documentation doesn't seem to have changed... Still says:

... This new check was identified as the issue because boot.img partition digest doesn't match after Magisk flashing so dm-verity devices indicate corrupt boot image and update/slot will be marked as failed/corrupted... I believe disabling verity/verification can't help since vbmeta can't be tampered for delta updates using update engine either...

I mentioned this here:
https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-87762979

The issue is still marked in GitHub as wontfix...

Do you know if Google has in fact changed/reverted their digest checks, or if this actually works w/ up-to-date releases for some?... And perhaps you could link a user's success story?... Thanks, PW
Yeah, I'm aware that back in June vvb2060 stated that the OTA feature in Magisk doesn't work on Pixels because the partition digest calculations were not overwriting the original values . To my knowledge, no one has submitted a PR for that issue. Nor am I aware of any changes since then to the digest checks.

There is also a related issue here.

Nonetheless, as stated earlier, some people have had success as recently as last month's January security update. It still holds, though, that the majority of people are unsuccessful, at least in my observation. So I wouldn't say it was "broken", per se, but rather "much of the time does not work as intended". I still advise people to not use this method.

On a side note, I have also seen a few people who were able to successfully take an OTA while rooted. Of course they lost root after they rebooted, but they were still able to successfully update while rooted even though the update should have failed due to the pre-OTA block verifications.

Below is a quick sample of success stories, from July to last month (I think 3 of them are in December). There are others and I have also seen people report on Telegram that they were successful.










 

pndwal

Senior Member
I use Payload dumper go by @osm0sis .
It's a Magisk module and you can extract specific partitions from payload.bin on device without unpacking the whole thing.
So that'd be Payload Dumper Go for Android...

payload-dumper-go (ported the original Python payload_dumper into Go) is officially pre-built for macOS, Windows and Linux...

it sounds like you need Magisk installed, so you can use a Magisk module to extract a file you need to install Magisk. Possibly useful if using one phone as a workstation to install Magisk on another phone.
True that.
Totally useless if you have only one unrooted phone😊
However, the pc version should do the same, without bothering with python.
So Payload Dumper Go may now be the go-to, way-to-go solution for PC etc...

But, aside from initial Magisk installation it seems Payload Dumper Go for Android can be used for OS updates while being very useful for avoiding transferring full OTA to PC to me, no? 🤔

I have no experience with A/B devices and payload.bin format for seamless streamed updates, but for updating already rooted A/B devices can't we avoid transferring full OTA to PC this way by
1) downloading full OTA directly to device
2) extracting boot.img using Payload Dumper Go for Android
3) taking update* and rebooting to new unrooted slot
4) patching boot.img w/ Magisk App
5) Transferring patched-boot.img (only) to PC
6) using patched-boot.img to fastboot boot (temp boot) system with root and then Magisk App Direct install to permanently root system, or
6b) fastboot flashing patched-boot.img to permanently root system?

* Nb Users should turn airplane mode on before rebooting to prevent PI deviceIntegrity failure and device becoming uncertified due to loss of root after rebooting... Turn airplane mode off after root and USNF are restored... Thanks @BillGoss! 👍

... Please say if I'm missing something..🙃 PW
 
Last edited:
  • Like
Reactions: rodken and ipdev

BillGoss

Senior Member
Sep 2, 2010
5,563
4,909
Sydney
OnePlus 8T
OnePlus 9 Pro
So that'd be Payload Dumper Go for Android...

payload-dumper-go (ported the original Python payload_dumper into Go) is officially pre-built for macOS, Windows and Linux...



So Payload Dumper Go may now be the go-to, way-to-go solution for PC etc...

But, aside from initial Magisk installation it seems Payload Dumper Go for Android can be used for OS updates while being very useful for avoiding transferring full OTA to PC to me, no? 🤔

I have no experience with A/B devices and payload.bin format for seamless streamed updates, but for updating already rooted A/B devices can't we avoid transferring full OTA to PC this way by
1) downloading full OTA directly to device
2) extracting boot.img on rooted device
3) taking update and rebooting to new unrooted slot
4) patching boot.img w/ Magisk App
5) Transferring patched-boot.img (only) to PC
6) using patched-boot.img to fastboot boot (temp boot) system with root and then Magisk App Direct install to permanently root system, or
6b) fastboot flashing patched-boot.img to permanently root system?

... Please say if I'm missing something..🙃 PW
You need to turn airplane mode on in step 3 before rebooting otherwise your phone will become uncertified since it's unlocked and unrooted after rebooting.
Once you've rooted it and installed USNF, then you can turn airplane mode back off.

PS: sent you a PM
 
Last edited:

shoey63

Recognized Contributor
Yeah, I'm aware that back in June vvb2060 stated that the OTA feature in Magisk doesn't work on Pixels because the partition digest calculations were not overwriting the original values . .

Nonetheless, as stated earlier, some people have had success as recently as last month's January security update. . . .
I can think of a few scenarios.

- Updating from old firmware, when the OTA method still worked.

- Forced update, even though rooted.

- Confusing an OTA update they did on an older Pixel where it still works and reporting it as working on 6/7.

- Trolling 😂
 

Lughnasadh

Senior Member
Mar 23, 2015
4,950
5,709
Google Nexus 5
Huawei Nexus 6P
I can think of a few scenarios.

- Updating from old firmware, when the OTA method still worked.

- Forced update, even though rooted.

- Confusing an OTA update they did on an older Pixel where it still works and reporting it as working on 6/7.

- Trolling 😂
One problem is that the Pixel 7 was released in October, well after vvb2060 said in June that the method didn't work on Pixels.

Actually a forced update on the Pixel 6 moving from A12 to A13 while rooted isn't inconceivable since they really wanted people to update, especially given the new anti-rollback protection situation that came with the A13 bootloader. If memory serves correctly in this old brain of mine, some of the instances where people were able to update while rooted may have occurred while moving from A12 to A13. But I would think users would know when they had a forced update versus manually updating through the Magisk OTA feature.

Confusion and trolling....well, what can I say 😅

I can actually think of a few reasons why it didn't work when it should have, aside from the partition digest checking scenario:

-They had Magisk mods installed that needed updating and weren't disabled, causing a bootloop. They then assumed the OTA method didn't work because it bootlooped, rather than thinking a mod may have caused it (this happens quite often).

-They were using a custom kernel at the time of the update. The Magisk restore function won't return all the images a custom kernel modifies to stock since custom kernels involve modifying the boot (P6 & 7), dtbo (P6 & 7), vendor_boot (P6 only), vendor_kernel_boot (P7 only), and vendor_dlkm (P6 & &7) images.

Also, on the P7 the vbmeta image has to be modified to flash a custom kernel (via disabling verity and verification). In the early days on the P6 the vbmeta image also had to be modified to be able to flash a custom kernel, although you could do it by just disabling verity and leaving verification alone.

-They modified some other partition/image which wasn't returned to stock beforehand.

Probably a couple more scenarios that aren't creeping into my brain at the moment given the cobwebs and coffee still brewing 🙃

I think there are just too many examples where it worked to say that it is completely broken. On the other hand, there are too many examples where it didn't work, and code changes, to say that it does work properly.
 
Last edited:

shoey63

Recognized Contributor
So that'd be Payload Dumper Go for Android...

payload-dumper-go (ported the original Python payload_dumper into Go) is officially pre-built for macOS, Windows and Linux...



So Payload Dumper Go may now be the go-to, way-to-go solution for PC etc...

But, aside from initial Magisk installation it seems Payload Dumper Go for Android can be used for OS updates while being very useful for avoiding transferring full OTA to PC to me, no? 🤔

I have no experience with A/B devices and payload.bin format for seamless streamed updates, but for updating already rooted A/B devices can't we avoid transferring full OTA to PC this way by
1) downloading full OTA directly to device
2) extracting boot.img using Payload Dumper Go for Android
3) taking update* and rebooting to new unrooted slot
4) patching boot.img w/ Magisk App
5) Transferring patched-boot.img (only) to PC
6) using patched-boot.img to fastboot boot (temp boot) system with root and then Magisk App Direct install to permanently root system, or
6b) fastboot flashing patched-boot.img to permanently root system?

* Nb Users should turn airplane mode on before rebooting to prevent PI deviceIntegrity failure and device becoming uncertified due to loss of root after rebooting... Turn airplane mode off after root and USNF are restored... Thanks @BillGoss! 👍

... Please say if I'm missing something..🙃 PW
For pixel 6 you nailed it, and @BillGoss ,s airplane mode trick is something I hadn't thought of and will try.
My other slot A/B device is (as you are aware) is ROG phone 3, which is a strange beast.
Not only do you unlock the bootloader with their "special app" instead of fastboot (no OEM unlock option in developer options), but updating if rooted is weird as well.
You download the new firmware to internal storage and reboot.
Then you get a notification about a new update and after accepting, it installs to the opposite slot.
From there it's a simple matter of installing magisk to the opposite slot after OTA and rebooting. No restoring of images required.
Different horses for different courses 😋
 

Top Liked Posts

  • There are no posts matching your filters.
  • 10
    Hi all. 😊

    To put this in to the light (full sunshine).

    Companies and their app(s) do not care if you or you device is at risk.
    It is no concern to them if harm falls on you.

    What concerns them is liable.

    The companies that are more secure in how they handle sensitive data, do not care if you are using a 'rooted' device.
    or
    - They have a legal team that can overpower the litigation.
    - They have the finances to payout a settlement.​
    Has anyone seen a post about Amazon not working on a rooted/insecure device? :unsure:

    Cheers. :cowboy:
    7
    For those that don't know, Platform Tools versions 34.0.0 & 34.0.1 have a problem booting into fastbootd. There have been several users who have ended up with unresponsive phones while flashing factory images on Pixels. Version 33.0.3 is the last correctly working version. Google is aware of this and is working on a fix.

    Here is a link to a link to 33.0.3.
    5
    hi all, any idea to enable core only for magisk delta in twrp terminal?
    Rename to disabler.zip and flash
    4
    Haha... I thought someone might bring up these things! 🙃

    Of course the main point was always the need to tarball image files...

    Seems the members issues stem from Odin flashing being incompatible with raw .img files... and I gave examples of differing extraction / tarballing / patching / flashing procedures that should work...
    @pndwal Point of order: If you have a magisk-patched-boot.img and you are going to make a tar, you meed to rename (or copy) magisk-patched-boot.img to "boot.img" and put *that* into a tar -- it's important for the names in the tar to match the partition names.
    I actually read such claims but didn't repeat them as the need is far from clearly established as far as I can see (and Sammy users can always rename files if needed or if they wish)...

    This may well be important as you say at least for some Odin versions. (Again, Sammy users may know better.) However many instructions don't indicate a need to use partition names, eg
    https://forum.gsmhosting.com/vbb/f777/how-flash-custom-kernel-using-odin-download-2574060/
    and
    https://medium.com/@oliviaroborts/odin-download-to-flash-custom-kernel-on-galaxy-device-e53d3eac744f
    And official TWRP instructions simply say "select the tar file that you downloaded (twrp-3.7.0_9-0-hlte.img.tar etc) and flash the device" so it seems Odin is smart enough to recognise this as a recovery image despite not including "recovery" in filename...
    https://twrp.me/samsung/samsunggalaxynote3internationalexynos.html

    Here's a guide that bears out the fact that Odin builds at least since 3.11 (May 2016) do "file analysis" to determine partition/image type and flashes files named differently to the correct partition (rather than using file names):
    https://droidtechknow.com/how-to/twrp/install-twrp-recovery-on-samsung/

    In this example TWRP.tar is detected as containing "Single download recovery.img" and flashed correctly as such per output log:
    TWRPOdinsuccess.png


    And John Wu warned against having less than boot, recovery, and vbmeta in the AP.tar; and against not filling all four slots in Odin -- many people's success stories to the contrary not withstanding.
    Well yes, but specifically for Sammy devices launched w/ SAR+ (ie SAR or 2SI) booting...

    Members device launched w/ Android 4.3 (Jelly Bean), upgradable to stock 5.0 (Lollipop), and John does say "If your Samsung device is NOT launched with Android 9.0 or higher, you are reading the wrong section"...

    I began giving advice based on pre A9 Android and guides make it clear that flashing Magisk patched AP binary alone is fine for these devices... Also, older devices didn't have vbmeta partitions, and only AP binary anyway... BL and CP binaries were seperated out more recently...

    Once the member indicated device runs a custom AOSP build however (we still don't know if this is an A10+ however... Nb. legacy ramdisk devices don't convert to legacy SAR w/ A9 running version but necessarily become 2SI w/ updates to A10 RV incl. custom ROMs), I did point the possibility of some of John's cautions for SAR+ devices applying per:
    Nb. 2 if you are running A10+ your legacy ramdisk boot type device has been converted to 2SI boot type which is a form of SAR for Magisk purposes... This means that despite official Installation instructions saying "If your Samsung device is NOT launched with Android 9.0 or higher, you are reading the wrong section", some of the caveats in the Samsung (System-as-root) section may now apply... Apart from knowing you are now using what John defines as SAR device (Google doesn't), it's hard to know which apply... 😬
    ... Of course flashing only the available boot.img (after patching and tarballing by clicking Odin "AP" button and loading the magiskpatched-boot.img.tar file before flashing) is quite different from John's prescribed method for A9+/SAR+ LV (launch version) devices of flashing the complete AP binary (after patching) along with other binaries anyway!... It's akin to flashing a discreet boot image w/ fastboot...

    Guides indicate this method works fine for older Sammy devices however...

    ... Please let me know if I'm missing something obvious though... I may well be wide of the mark as I have no practical experience with Odin and have only done cursory searches... 🙂 PW
    4
    @chrbur, @elimiriel

    For those using Canary builds

    Please be aware that in 25207+ major refactoring (of selinux rule patching) has broken many modules etc... This is likely the cause of issues with hiding using recent builds as Shamiko is affected... Please see discussion in Magisk Discussion thread...

    You could revert to 25206 or wait for fixes hopefully in 25211... 👀 PW
  • 134
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    69
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    61
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    56
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.

    Play Intergrity API Checker
    This app shows info about your device integrity as reported by Google Play Services.
    If any of this fails could mean your device is rooted or tampered in a way (for example you have an unlocked bootloader).​

    Development:

    Download Links:

    Credits:
    1nikolas
    All who contribute and support this project.

    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    47
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​