[Discussion] Magisk - The Age of Zygisk.

Search This thread

xabier-bo

Senior Member
Sep 17, 2014
150
29
Hello

I have had a problem with various complications (I won't explain them all), and now I have a working mobile, but I can't re-root again.

Device:
- Xiaomi Lisa
- It was rooted with Magisk 25.2
- And various modules
- It does not have TWRP recovery, and Orange Fox does not decrypt data on Android 13

Situation:
- I received the OTA Android 12-> 13 (MIUI 13->14) (stock EU).
- I decided to download it to extract boot.img and patch it.
- Against the usual (and configured), instead of waiting for confirmation to install (time to apply the standard OTA update procedure: restore stock images and flash Magisk to empty slot), it started the process.
- When I realized I did the restore images, and let it reboot
- It ended up in a strange bootloop (at least for me): a few seconds after booting, showing the launcher, and even being able to open some app, the phone reboots and ends up in MIUI recovery.
- (...)
- Finally I manage to reflash the new ROM ("except storage"), and the phone boots fine.
- I patch the new boot
- But when I do the standard boot on the patched image, the problem of that "strange" bootloop is reproduced.
- Attempts to apply uninstall.zip fail because the recovery does not mount data.
- ((Finally, at home we have another Lisa. I opted to completely uninstall Magisk, flash the new ROM, then boot with the patched image and install Magisk, and it did not give any problems. I'm thinking to do the same in future...)).


The questions begin. I will also appreciate any rectification if something I say is not correct, to continue learning:
- It seems that there was something left of Magisk that creates a conflict, no?
- Since the modules and Magisk are inside \data, it is not possible to uninstall with uninstall.zip, is it?
(in fact in one of the tests with OFox (which does not see \data) it instead installed Magisk, giving the same problem
- as the mobile is not really rooted, there is no chance I could delete modules folder, right?
- And only with the mobile rooted I could ask the Magisk Manager to uninstall completely, no?
But as it does not give me time to run it because the phone restarts, and when it does is without rooting, I can't
- The time to reboot with the mobile temporarily rooted begins once I have entered the unlock pin. As I said, it doesn't give me time enough to interact with the applications.
Would there be any script (I'm not a developer) that I can run from terminal as soon as I have unlocked the phone, so it has effect before the device restarts? (stop process, remove folder...)

- Any idea (that does not involve formatting data...)?

Thanks
 
Last edited:

pndwal

Senior Member
Hello

I have had a problem with various complications (I won't explain them all), and now I have a working mobile, but I can't re-root again.

Device:
- Xiaomi Lisa
- It was rooted with Magisk 25.2
- And various modules
- It does not have TWRP recovery, and Orange Fox does not decrypt data on Android 13

Situation:
- I received the OTA Android 12-> 13 (MIUI 13->14) (stock EU).
- I decided to download it to extract boot.img and patch it.
- Against the usual (and configured), instead of waiting for confirmation to install (time to apply the standard OTA update procedure: restore stock images and flash Magisk to empty slot), it started the process.
- When I realized I did the restore images, and let it reboot
- It ended up in a strange bootloop (at least for me): a few seconds after booting, showing the launcher, and even being able to open some app, the phone reboots and ends up in MIUI recovery.
- (...)
- Finally I manage to reflash the new ROM ("except storage"), and the phone boots fine.
- I patch the new boot
- But when I do the standard boot on the patched image, the problem of that "strange" bootloop is reproduced.
- Attempts to apply uninstall.zip fail because the recovery does not mount data.
- ((Finally, at home we have another Lisa. I opted to completely uninstall Magisk, flash the new ROM, then boot with the patched image and install Magisk, and it did not give any problems. I'm thinking to do the same in future...)).


The questions begin. I will also appreciate any rectification if something I say is not correct, to continue learning:
- It seems that there was something left of Magisk that creates a conflict, no?
- Since the modules and Magisk are inside \data, it is not possible to uninstall with uninstall.zip, is it?
(in fact in one of the tests with OFox (which does not see \data) it instead installed Magisk, giving the same problem
- as the mobile is not really rooted, there is no chance I could delete modules folder, right?
- And only with the mobile rooted I could ask the Magisk Manager to uninstall completely, no?
But as it does not give me time to run it because the phone restarts, and when it does is without rooting, I can't
- The time to reboot with the mobile temporarily rooted begins once I have entered the unlock pin. As I said, it doesn't give me time enough to interact with the applications.
Would there be any script (I'm not a developer) that I can run from terminal as soon as I have unlocked the phone, so it has effect before the device restarts? (stop process, remove folder...)

- Any idea (that does not involve formatting data...)?

Thanks
Much in this section of @Didgeridoohan's Wiki:
https://www.didgeridoohan.com/magisk/MagiskModuleIssues#

Scroll down to Disabling/uninstalling modules manually... First option is w/ ADB from PC... Many more...

Look around that wiki first for other pointers too... It's old, but it's gold... 👀 PW
 

xabier-bo

Senior Member
Sep 17, 2014
150
29
Much in this section of @Didgeridoohan's Wiki:
https://www.didgeridoohan.com/magisk/MagiskModuleIssues#

Scroll down to Disabling/uninstalling modules manually... First option is w/ ADB from PC... Many more...

Look around that wiki first for other pointers too... It's old, but it's gold... 👀 PW
Thanks, so you give me some hope...!!!

As I said, for keep on learning: what I posted makes sense?
Or there is some mistake in the reasoning?

I'll read the wiki but was just thinking that a prepared and "fast" executed adb line to remove (knowing what to do!) moduls/Magisk, could do
 

xabier-bo

Senior Member
Sep 17, 2014
150
29
Much in this section of @Didgeridoohan's Wiki:
https://www.didgeridoohan.com/magisk/MagiskModuleIssues#

Scroll down to Disabling/uninstalling modules manually... First option is w/ ADB from PC... Many more...

Look around that wiki first for other pointers too... It's old, but it's gold... 👀 PW
Still facing some issues (don't know which module is causing problems), but
adb wait-for-device shell magisk --remove-modules
did it.
At least I've the phone rer-ooted
Thanks again
 
  • Like
Reactions: J.Michael

pndwal

Senior Member
Still facing some issues (don't know which module is causing problems), but
adb wait-for-device shell magisk --remove-modules
did it.
At least I've the phone rer-ooted
Thanks again
Yup... Thought that would fix bootloop with root...

What other issues? I'm guessing S/N ctsProfileMatch and PI deviceIntegrity w/ USNF?... If so, many users now face this:
https://forum.xda-developers.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/post-88114877

🙃 PW
 
Last edited:
  • Like
Reactions: xabier-bo

pommedefrance

Member
Jan 18, 2019
23
2
Hello
with A13, I can't see the work profile apps anymore, so I can't hide them from magisk and they detect the root
Is there anything I can do?
a bug with shelter ?
 

meric57

Senior Member
Oct 2, 2017
292
58
Oeutrange
Samsung Galaxy Tab E
Last edited:

YLNdroid

Senior Member
Lloyds Bank mobile app continues to detect root.
https://play.google.com/store/apps/details?id=com.grppl.android.shell.CMBlloydsTSB73&hl=en_GB&gl=US

Device and Model Number: Motorola G7 Power XT1955-4 (ocean)
Android running version: 10 - stock firmware

Procedure implemented:
  1. Zygisk is enabled.
  2. DenyList is enforced.
    Lloyds Bank app was added to the DenyList.
  3. Installed Universal SafetyNet Fix v2.4.0-Mod_1.1 modded by Displax, rebooted device; verified said app's presence in the DenyList.
    Play Integrity API Checker app yields pass for Device Integrity and Basic Integrity.
  4. Disabled Developer options.
  5. Hid the Magisk app and renamed it using the in-built feature.
  6. Froze the renamed Magisk app using the Ice Box app.
  7. Lloyds Bank app was force stopped, cache and data were cleared; device was rebooted.
  8. Attempt to authenticate into the said banking app, yielded the error depicted by the image below.
    IMG_20230213_033420857.jpg
 
Last edited:
  • Like
Reactions: beeshyams

manlikesenku

New member
Jul 20, 2022
4
7
UK banking apps also stopped working for me.
I managed to get the chase banking app working again through this device id changer:

However my metro app doesn't show on the id changer list so I can't use that on it.
Any ideas?
 
  • Like
Reactions: pndwal

pndwal

Senior Member
UK banking apps also stopped working for me.
I managed to get the chase banking app working again through this device id changer:

However my metro app doesn't show on the id changer list so I can't use that on it.
Any ideas?
I can't find list, at least on free version... Seems to change device ID globally... Does full app work differently?... Target only specific apps?... PW
 

Top Liked Posts

  • There are no posts matching your filters.
  • 10
    Hi all. 😊

    To put this in to the light (full sunshine).

    Companies and their app(s) do not care if you or you device is at risk.
    It is no concern to them if harm falls on you.

    What concerns them is liable.

    The companies that are more secure in how they handle sensitive data, do not care if you are using a 'rooted' device.
    or
    - They have a legal team that can overpower the litigation.
    - They have the finances to payout a settlement.​
    Has anyone seen a post about Amazon not working on a rooted/insecure device? :unsure:

    Cheers. :cowboy:
    7
    For those that don't know, Platform Tools versions 34.0.0 & 34.0.1 have a problem booting into fastbootd. There have been several users who have ended up with unresponsive phones while flashing factory images on Pixels. Version 33.0.3 is the last correctly working version. Google is aware of this and is working on a fix.

    Here is a link to a link to 33.0.3.
    5
    hi all, any idea to enable core only for magisk delta in twrp terminal?
    Rename to disabler.zip and flash
    4
    @chrbur, @elimiriel

    For those using Canary builds

    Please be aware that in 25207+ major refactoring (of selinux rule patching) has broken many modules etc... This is likely the cause of issues with hiding using recent builds as Shamiko is affected... Please see discussion in Magisk Discussion thread...

    You could revert to 25206 or wait for fixes hopefully in 25211... 👀 PW
    4
    yeah no dude you have a bigger problem I just looked at the support thing you submitted in the pixel flasher page it sims you tried to flash your rom using the latest platform tools which has a problem with fastbootd so you need to use an older platform tools to flash your rom again
  • 134
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    69
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    61
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    56
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.

    Play Intergrity API Checker
    This app shows info about your device integrity as reported by Google Play Services.
    If any of this fails could mean your device is rooted or tampered in a way (for example you have an unlocked bootloader).​

    Development:

    Download Links:

    Credits:
    1nikolas
    All who contribute and support this project.

    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    47
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​