• We are moving to xdaforums.com!

    Posts made between now and when the migration is complete will not be carried over.
    You will be automatically redirected once the migration is complete.

[Discussion] Magisk - The Age of Zygisk.

Search This thread

chiteroman

Senior Member
Nov 4, 2019
546
614
22
Oviedo
Samsung Galaxy J7
Xiaomi Mi A2 Lite
Hence no better choice than Delta (and without Shamiko)😁
1000000123.jpg
Yeah, Magisk Alpha also has hide :)
 

CharlieMHz

Senior Member
Apr 27, 2015
264
68
Xiaomi Poco F3
The latest update 1.7.99.1 of TnG (Touch n' Go eWallet) app has started detecting Zygisk. I was able to get it working by turning off Zygisk, but USNF stops working so other apps detect root. For now I'm having to use an older version of the app (1.7.99 or older).

I'm on Magisk Delta latest stable (b8694c99-delta (25206)), with MagiskHide on, no other hiding modules installed. USNF 2.4.0 MOD 1.2 by Displax.

EDIT:
A workaround I discovered was to turn on Enforce SuList and add apps that need root to the SuList (guide below). I had to uninstall, reboot and reinstall USNF for other banking apps to work.
Link to post describing how to switch to SuList: https://forum.xda-developers.com/t/...third-party-magisk-fork.4460555/post-88269135
And the link to the post containing the attachment for sulist-auto-whitelist module: https://forum.xda-developers.com/t/...third-party-magisk-fork.4460555/post-88272583

 
Last edited:
  • Like
Reactions: J.Michael

zellleonhart

Senior Member
Jan 19, 2013
582
187
The latest update 1.7.99.1 of TnG (Touch n' Go eWallet) app has started detecting Zygisk. I was able to get it working by turning off Zygisk, but USNF stops working so other apps detect root. For now I'm having to use an older version of the app (1.7.99 or older).

I'm on Magisk Delta latest stable (b8694c99-delta (25206)), with MagiskHide on, no other hiding modules installed. USNF 2.4.0 MOD 1.2 by Displax.

EDIT:
A workaround I discovered was to turn on SuList and add apps that need root to the SuList. I had to uninstall, reboot and reinstall USNF for other banking apps to work.

Hi, I enabled Sulist and I can't boot into my OS anymore, now trying to fix it. Is there any steps I need to take if I enable SuList?
 

prokiller1199

Senior Member
Nov 14, 2014
219
46
Johor Bahru
The latest update 1.7.99.1 of TnG (Touch n' Go eWallet) app has started detecting Zygisk. I was able to get it working by turning off Zygisk, but USNF stops working so other apps detect root. For now I'm having to use an older version of the app (1.7.99 or older).

I'm on Magisk Delta latest stable (b8694c99-delta (25206)), with MagiskHide on, no other hiding modules installed. USNF 2.4.0 MOD 1.2 by Displax.

EDIT:
A workaround I discovered was to turn on SuList and add apps that need root to the SuList. I had to uninstall, reboot and reinstall USNF for other banking apps to work.

Hey, I had this problem with this version as well. Do you mean turn on the toggle of "Enforce SuList"?
 

zgfg

Senior Member
Oct 10, 2016
9,654
7,514
Redmi K20 / Xiaomi Mi 9T
Xiaomi Mi 11
Hey, I had this problem with this version as well. Do you mean turn on the toggle of "Enforce SuList"?
To enable SuList in Delta it is not only turning on it's toggle

Please, there is Delta thread here on XDA, read the posts there about properly setting SUList (all root apps must be enabled in SuList and use sulist-auto-whitelist module)
 

CharlieMHz

Senior Member
Apr 27, 2015
264
68
Xiaomi Poco F3
To enable SuList in Delta it is not only turning on it's toggle

Please, there is Delta thread here on XDA, read the posts there about properly setting SUList (all root apps must be enabled in SuList and use sulist-auto-whitelist module)
Thanks, was not aware that there was extra steps needed for SuList, I've updated my post with the relevant info.
 
  • Like
Reactions: zgfg

rudzik12

New member
Jan 31, 2015
3
0
I have a problem with the zygisk module in the Sony XZ1 Compact (G8441) phone - after enabling it, the phone restarts after a while. Same after startup.
Magisk 26.1.
Previously I was using magisk version 21.X and everything worked (except cts profile - the phone didn't pass the test).
I tried to run zygisk without any exclusions - still after starting and several seconds the phone freezes and restarts.

Do you have any ideas?
 

J.Michael

Recognized Contributor
Jan 20, 2018
2,079
2,477
Samsung Galaxy Tab A series
Since the latest version, on A12, magisk says suddenly it's not installed. After a reboot magisk is installed and works for a few minutes and then again, it's not installed. What can cause this?
Can you find any kind of log file?

Maybe, after Magisk stops being installed, you can go into a terminal emulator and see what "dmesg" has to say. (I don't remember if you need privilege to use "dmesg".)
 
  • Like
Reactions: Lughnasadh

scareferatis

Member
Jul 22, 2019
6
1
I'm having issue bypassing root for HTTP Injector and NapsterNetV apps on both Black Shark 2 and Samsung S22.

BS2:

- Android Pie
- Latest Magisk Alpha with Universal SafetyNet Fix MOD (passes flawlessly) and latest Shamiko. Both apps are added to Shamiko's DenyList. HTTP Injector crashes itself, while Napster says Rooted users are unable to use this config.

S22:

- Pixel Experience Android 13
- Latest Magisk Delta with SUList enabled and all root stuff hidden.

Injector doesn't crash, but detects root while importing config. Same goes for Napster.

Here's a dummy NapsterNetV config with root block. Change the extension to .npv4 and import through the app to replicate my problem. Unfortunately, I can't give you an .ehi HTTP Injector file, because my S22 is currently bricked after failed restore.

UPDATE: Cleaned HTTP Injector's cache and reinstalled. Still detects root, but at least it runs. I've managed to create a dummy file. Change extension to .ehi and import.
 

Attachments

  • Dummy.zip
    1.8 KB · Views: 8
  • 1.zip
    1.4 KB · Views: 7
Last edited:
  • Like
Reactions: J.Michael

zgfg

Senior Member
Oct 10, 2016
9,654
7,514
Redmi K20 / Xiaomi Mi 9T
Xiaomi Mi 11
I'm having issue bypassing root for HTTP Injector and NapsterNetV apps on both Black Shark 2 and Samsung S22.

BS2:

- Android Pie
- Latest Magisk Alpha with Universal SafetyNet Fix MOD (passes flawlessly) and latest Shamiko. Both apps are added to Shamiko's DenyList. HTTP Injector crashes itself, while Napster says Rooted users are unable to use this config.

S22:

- Pixel Experience Android 13
- Latest Magisk Delta with SUList enabled and all root stuff hidden.

Injector doesn't crash, but detects root while importing config. Same goes for Napster.

Here's a dummy NapsterNetV config with root block. Change the extension to .npv4 and import through the app to replicate my problem. Unfortunately, I can't give you an .ehi HTTP Injector file, because my S22 is currently bricked after failed restore.

UPDATE: Cleaned HTTP Injector's cache and reinstalled. Still detects root, but at least it runs. I've managed to create a dummy file. Change extension to .ehi and import.
At the beginning you said "passing flawlessly" - does it refer to SafetyNet (deprecated) or Play Integrity (but without Strong Integrity - that's what is relevant)

Are you using the latest USNF but from Displax (not the 'official')

Have you tried with Hide Magisk app

Disable LSPosed (if you have) and all other irrelevant Magisk modules and try again, but always Wipe Data (not just cache) for those apps you are testing

If still not passing, install/enable LSPosed and try with Hide My AppLlist (with other LSPosed modules disabled)

If you had XLua, you must manually delete its remaining folders

Must not run SELinux Permissive mode

Some apps may even look if Developer Options are enabled - there is an LSPosed module to hide

Etc - unfortunately, hiding is not only about SafetyNet, DenyList/Magisk Hide and Shamiko (on top of above, some apps may even look for TWRP folder)
 
Last edited:
  • Like
Reactions: J.Michael

astrogrilsz

New member
Apr 19, 2023
3
0
Help please. I was accidentaly uninstalling magisk and get unrooted when i check it using root checker. Is it possible to root it again without wipe data? Im using samsung a52. Please tell me the method if there is any method
 

pndwal

Senior Member
Help please. I was accidentaly uninstalling magisk and get unrooted when i check it using root checker. Is it possible to root it again without wipe data? Im using samsung a52. Please tell me the method if there is any method
Not familiar with Sammy devices, but seems you're not facing the critical issues requiring data wipe mentioned in installation instruction page if you can still boot!

In Magisk App what do you see for Magisk Installed?... If N/A, type magisk -c and magisk -v in a terminal emulator app to be sure Magisk is not installed.

If really uninstalled, I'd be backing up all your personal data in case of issues at this point, then patch AP from current ROM in Magisk App and Odin flash it along with BL + CP + HOME_CSC. This should get you rooted again without wiping data. 🙂

Might pay to wait for further advice from Sammy users... 😉 PW
 
Last edited:
  • Like
Reactions: J.Michael

hossanshihab

New member
Jun 14, 2023
1
0
i have issue samsung A10s 7F/DS Baseband S8 Magisk patched boot image successfully flashed. But magisk app show not installed N/A Please help me ANdroid Version 11. Bootloader unlocked.
 

tenghc

Senior Member
Jul 26, 2013
167
102
Xiaomi Poco F3
Xiaomi Mi Pad 5
The latest update 1.7.99.1 of TnG (Touch n' Go eWallet) app has started detecting Zygisk. I was able to get it working by turning off Zygisk, but USNF stops working so other apps detect root. For now I'm having to use an older version of the app (1.7.99 or older).

I'm on Magisk Delta latest stable (b8694c99-delta (25206)), with MagiskHide on, no other hiding modules installed. USNF 2.4.0 MOD 1.2 by Displax.

EDIT:
A workaround I discovered was to turn on Enforce SuList and add apps that need root to the SuList (guide below). I had to uninstall, reboot and reinstall USNF for other banking apps to work.
Link to post describing how to switch to SuList: https://forum.xda-developers.com/t/...third-party-magisk-fork.4460555/post-88269135
And the link to the post containing the attachment for sulist-auto-whitelist module: https://forum.xda-developers.com/t/...third-party-magisk-fork.4460555/post-88272583

Hi, do you happen to able to pass the latest pb engage MY app? If you have older version 2.57.0 can you share to me?
 

tenghc

Senior Member
Jul 26, 2013
167
102
Xiaomi Poco F3
Xiaomi Mi Pad 5
I can reach the login screen without any root detection errors. As for older version, I do not have it. I usually get older version APKs from APKMirror or APKPure, but I can't find PB Engage there.
View attachment 5932633
May I know what version of pb engage my you have there? Mine is version (2.60.0). Now mine showing this instead. After I update when I open it crashes and crashes even when I unrooted and uninstalled magisk thru TWRP. Not sure how to pass it now.
 

Attachments

  • Screenshot_2023-06-14-21-54-33-274_com.android.chrome.jpg
    Screenshot_2023-06-14-21-54-33-274_com.android.chrome.jpg
    614.6 KB · Views: 42

Top Liked Posts

  • 3
    There will always be those who'll look a gift horse in the mouth...

    Personally, I like Android and find the emotive bashing of the company behind our moddable (by design) mobile OS (an 'evil' company??) that some post here distasteful.

    I don't wear rose coloured glasses and I've called out Google for bad decisions relating to Android from time to time (on XDA), but i recommend being informed about whats real in order to avoid the disappointments encountered when our expectations are simply not...

    AOSP is a fantastic free gift AFAIC, but be real folks!... It's for OEMs (who might not even let you unlock... c'mon Nokia!), for app developers (who might work for banks etc and want strong attestations to device security/integrity, or for streaming companies and might require TEE in hardware for secure DRM content decoding), for consumers (who generally want assurances of security and reliability), and lastly, for (a relatively small group of) modders (who want everything!... of course they do; they've been spoilt for too long. 😬)

    For those who haven't already judged the company charged with keeping these four groups with their diverse interests happy while meeting their own commercial objectives (including remaining competitive and being perceived as a secure mobile OS) harshly, I put a few details about Open Source Android, it's production and proprietary GMS here a couple of months ago:
    https://forum.xda-developers.com/t/module-mod-universal-safetynet-fix.4553699/post-88810503

    Here's something on Google's willingness to accommodate employed modders who 'play by the rules':
    https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-88740649

    And a response to a member a year ago about Google's relationship with/view of modding community etc:
    https://forum.xda-developers.com/t/...ding-cat-and-mouse-game.4425939/post-87403921

    👀 PW
  • 9
    I'm happy to report back that I've now gotten all my bank apps to work!

    Long post ahead, warning...

    And the culprit turned out to be... a Magisk module that I was using, it was a simple module that installs a camera app as system app (ANXCamera). 🤦‍♂️ I'm so embarrassed and disappointed that I didn't try disabling all Magisk modules before this.

    Here's my minimal setup now:
    • Alpha Magisk - 7826d752-alpha (26301)
      • Hidden Magisk app
      • Uninstall root-related apps like HMA
    • Shamiko for alpha 0.7.3 (183)
      • Enforce DenyList OFF
    • Play Integrity Fix module 8.4 (only for McDonald's)
    You can use HMA to hide root-related app if you don't wanna use Magisk's own hiding and uninstalling other root apps (e.g. HMA, Momo, other LSposed apps).

    I'm surprised by how little is needed. Not even USNF/PI Fix, maybe cuz my banking apps don't check Play Integrity, as I'm now failing all 3 checks lol.

    Here are the banking apps I've tested:
    • HLB Connect (Hong Leong Connect)
    • RHB Mobile Banking
    • SC Mobile
    • CIMB Clicks
    • TnG eWallet (Touch n Go eWallet)
    Other apps:
    Microsoft Teams, Outlook and Intune Company Portal, McDonald's app

    The story:
    1. I started off fresh as suggested by @Catani. Uninstalled Magisk completely via the Magisk app. Booted up and some apps worked, some didn't.
    2. Installed Magisk through TWRP, booted up and most apps stopped working, as expected.
    3. Installed Shamiko for Alpha, and most apps started to work
    4. Tried hiding Magisk and uninstall HMA app. All apps are working now.
    5. Installed my other modules, and TnG stopped working, uninstalled some and narrowed the cause down to ANXCamera module.
    The fresh install may or may not have had an effect, I can't really tell conclusively. But it certainly helped me get to where I am now, by starting off with nothing and slowly adding fixes. Along the way here's some things I've noticed about those apps:
    • RHB and SC look for Magisk and HMA app. I tried running them and then installing HMA, one of the them immediately crashes and starts reporting root when I try to open it.
    • HLB needs Shamiko, and perhaps RHB and SC as well.
    • TnG doesn't need modules to work, just adding to DenyList is sufficient.
    • Microsoft apps seem to need Shamiko and look for root-related apps
    Thanks to all who have been part of this discussion: @Catani @Lord Sithek @spicediablo @zgfg, etc. and I hope my post can help others with similar banking apps.

    UPDATE 23/09/2023: McDonald's app required Play Integrity, so I installed PI Fix module for it to work. McDonald's app has nothing better to do than to detect root lol.
    7
    Yes. It's an Xposed module and it's worked for a couple years with no issues. It's actually on the play store.

    https://play.google.com/store/apps/details?id=com.redlee90.hideusbdebugging

    Also on the play store is "dev opts hide." and there's a module called on GitHub called "im not a developer." These are all lsposed modules. Another is "bootloaderSpoofer."

    In my experience I've only needed the deny list, play integrity bypass module, and one or two of the apps above even for the most impossible apps that think you're device is rooted when it's not. I've never understood all of these other mods like Shamiko, etc. They just end up overcomplicating something that is much more simple.
    Some modules you mention are simply to hide opportunistic indicators of device compromise rather than root... Applist detection is another such opportunistic detection, and even Google agrees that use of indicators of other apps to prevent another app's code from running is an abuse... Seems that's why they don't object to Hide the Magisk app function, or listing other app, directory and setting obfuscation solutions on Play Store...

    The concept behind Shamiko is pretty simple; John "sunsetted" MagiskHide root hiding, and encouraged 'Devs who are passionate about hiding' to "shine" by filling this void...

    Shamiko and simpler modules like Denylist Unmount, are proper root-hiding solutions...

    USNF and PIF are specific root hiding for GMS that also add needed device fallback to basic attestation and server end hardware backed evaluationType enforcement bypassing for SafetyNet and Play Integrity deviceIntegrity verdict spoofing (passing) that MagiskHide never added.

    Nb. Denylist is MagiskHide repurposed as a tool for something quite different; it allows Devs and others to run root, but 'allows Magisk modifications to simply 'get out of the way' by reverting/preventing (denying) modifications'... It is NOT designed for root hiding.

    Proper root hiding, like old MagiskHide, doesn't break ('deny') Magisk modifications or other modules (solutions) that inject into an app's zygote (processes). Further, while DenyList does hide root rudimentally by unmounting Magisk modifications including Zygisk, it won't 'manipulate expected signals', ie. it cannot alter (spoof) 'sensitive' prop values, nor does it automatically hide root from GMS processes as required for effective root hiding...

    All these essential root hiding functions are now the domain of 3rd party solutions like Shamiko... It's only 'overcomplicated' in comparison to the somewhat simpler hiding requirements that existed when John/Magisk exited the root hiding scene...

    🤠 PW
    6
    Of course, even if I cannot look at Google with good eyes because of what it is doing to Android, Google is not stupid in this regard. And yes, what these banks and their apps are doing is an abuse. In fact, it is a form of discrimination (like hate crimes), because using a rooted or modified Android system only means that we are making use of our administration rights by running as administrator or super user; and this is not against law or bad in any way! This is completely lawful and is our right to do so.
    It's them who are wrong and have demonized this by looking at it with fear instead of embracing the fact that users can run rooted Android systems. Period.
    This, in fact, is liable to be presented as a complaint in a court of law; and it's a guaranteed win for us, rooted Android users.

    What is more, the list of offenders is quite large, doesn't it? Many banks, for example; so big pockets, big pockets which need some slimming because of this abuse… :unsure:
    Speaking from a U.S. legal perspective, a case like this would likely be dismissed very early and would never see its day in court. There is no law that I know of (State or Federal) guaranteeing users the right to root/modify their devices which would prevent banks from implementing security measures in their apps, even if those security measures prevented the app from working properly on a rooted/modified device.

    It may be a moral wrong in some eyes, but it's not a legal wrong, civil or criminal.
    6
    Incidentally, it would be very helpful to this effort if other MIUI users could try to bypass Sparkasse banks S-PushTAN app's detection and report. See post above. 👍 PW
    After several attempts failing while on Magisk 26.2 stable/Magisk alpha (with LSposed zygisk, HMA) I got latest S-Push TAN (v4.2.3) now working with only latest
    Magisk 26.3 stable (hidden) and
    USNF v 2.40-Mod 1.2 by Displax.
    S-Push TAN on denylist, denylist enforced, zygisk activated.
    No LSposed ,no Shamiko,no HMA.

    Device: Xiaomi Mi9T (Redmi K20)
    Xiaomi.eu 12.5.2 (Android 11)

    Thanks to all the users testing and reporting especially @pndwal .
    6
    After the latest update of Hong Leong banking app, it is detecting root even after adding to unmount list as well as hide my apps. Anybody knows the workaround?

    Thanks!
    Magisk Alpha 26301, HLB Connect in Deny List, Deny List not enforced, Play Integrity Fix 8.4, Shamiko 0.7.3(174), HLB connect using my blacklist template in HMA, USB debugging disabled (temporarily). (this is my default catch all setup while testing any new app). Works fine for me. I dont use the app. Also, you can get success by using any of the above options or all of it together (thats for you to test)

    @Catani @skia16 Same setup as above, the app works I think, I dont understand the language
  • 142
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    73
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    62
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    58
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.

    Play Intergrity API Checker
    This app shows info about your device integrity as reported by Google Play Services.
    If any of this fails could mean your device is rooted or tampered in a way (for example you have an unlocked bootloader).​

    Development:

    Download Links:

    Credits:
    1nikolas
    All who contribute and support this project.

    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    49
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​