[Discussion] Magisk - The Age of Zygisk.

Search This thread

zgfg

Senior Member
Oct 10, 2016
7,378
4,771
Yes I appreciate that. I guess my question was if it is correct that after reboot USNF deselects the gms and gms.unstable

Thanks for the explanation.

FYI found what was triggering the app and got it working. Before I had just renamed Magisk (I renamed to MagicApp if that matters) but that didn't work. Also "pausing" the app wasn't enough.
I needed to actually uninstall the Magisk Manager app itself.

So the mechanism being used by the other app wasn't looking for Magisk/SU, but the app iself.
The App failing doesn't have any local file permissions so must've been something else.

Actually I found two apps failing root check and both were resolved by uninstalling the (renamed) Magisk APK.

So I wondered if the app was simply listening to debug messages.
So I reinstalled and then reproduced the failure looking into ADB logcat.

I could see during opening and just before the protection was triggered logcat events against the ".Magisk" app related to denying access. Uninstalling Magisk app stopped those messages and then the app was able to start.

Should Magisk "hiding" the magisk manager app by renaming it from ".Magisk" also have relabelled all of the messages and such related to the app?
There were similar discussions in the Magisk General Thread. For that cases, it turned out that hiding Magisk app (it does not need to be repackaged/renamed/"hidden' from the Magisk app itself) worked out by using Hide My Apps:
- you need Zygisk LSPosed (Magisk module)
- then Hide My Apps (LSPosed module)

And then you need to configure in HMA - not easy and short to explain

And hiding by HMA really works also for other purposes like detaching YouTube from Playstore (bcs root Vanced YT requires specific old YT version that must never be updated) and similarly for detaching AndroidAuto (Google allows only navigation and various messages - and only through voice control; if you want to write mails or watch YT or Netflix on the car entertainment screen even when you park the car, you need particular old AA version, because only then custom apps for AA like CarTube, Fermata, Screen2Auto, AAMirror can work - otherwise AA block them).
And (only) HMA turned so far to be reliable option for A12, for properly detaching AA from PlayStore, for the purpose as above
 
Last edited:

pndwal

Senior Member
Yes I appreciate that. I guess my question was if it is correct that after reboot USNF deselects the gms and gms.unstable

Thanks for the explanation.

FYI found what was triggering the app and got it working. Before I had just renamed Magisk (I renamed to MagicApp if that matters) but that didn't work. Also "pausing" the app wasn't enough.
I needed to actually uninstall the Magisk Manager app itself.

So the mechanism being used by the other app wasn't looking for Magisk/SU, but the app iself.
The App failing doesn't have any local file permissions so must've been something else.


Actually I found two apps failing root check and both were resolved by uninstalling the (renamed) Magisk APK.

So I wondered if the app was simply listening to debug messages.
So I reinstalled and then reproduced the failure looking into ADB logcat.

I could see during opening and just before the protection was triggered logcat events against the ".Magisk" app related to denying access. Uninstalling Magisk app stopped those messages and then the app was able to start.

Should Magisk "hiding" the magisk manager app by renaming it from ".Magisk" also have relabelled all of the messages and such related to the app?
Not sure if it's actually debug massages, but good analysis... You could say which bank / app you're using!...

Bank apps / devs requiring TEE are resorting to more and more clever tricks to detect / indicate a modified execution environment due to lack of confidence in SafetyNet API for obvious reasons.

It seems many are following Sparkasse banks S-PushTAN trick to detect even hidden / obfuscated Magisk app now as use of this app is universal w/ Magisk root.

Detecting applist should be prevented in theory since Android 11, but in practice some are still able to do this using some trickery, eg using Intent queries instead of API requests. Also, some like Sparkasse bank S-PushTAN can detect the hidden ('fully obfuscated") Magisk App by detecting the classes.dex code which does not change (unlike the package name) and can be used to identify the app. Their protection engine (Promon) seems to employ simple pattern matching on installed apps.

I was able to properly hide the already 'hidden' Magisk app (with Intent query hiding set) from S-PushTAN (and it would load) by using Hide My Applist LSPosed module. Hiding the unhidden app this way doesn't work (can app find package name etc even with HMA set?).

I have since discovered LSPosed HMA solution is no longer working for S. PushTAN since 3.5.2 on my MIUI device:
https://github.com/topjohnwu/Magisk/issues/1084#issuecomment-1013811582

Other MIUI users report report the same problem, but users of non MIUI
devices found PushTAN detects more apps but they could still subvert the detection simply by adding HMA app itself and other apps they used (GameGuardian etc) to HMA 'apps invisible' list for S. PushTAN. See issue thread above... PW
 
Last edited:

crypticc

Senior Member
Aug 22, 2009
1,165
139
London
Not sure if it's actually debug massages, but good analysis...

Bank apps / devs requiring TEE are resorting to ......

great info thank you.
There were similar discussions in the Magisk General Thread.....


Thank you both and thanks for the additional info. I had gotten as far as downloading Shamiko and LSPosed. I even added Shamiko to give it a whirl but it seemed to behave similarly to what Magisk deny + USNF were doing - although maybe I missed something as GPlay and YASNC told me I lost authentication/CTS. Probably I just didn't clear data out of enough google apps.

LSPosed seemed like a whole new rabbit hole to go down so I'd skirted that but I will follow the breadcrumb trails you've set out for me.

Anyhow, for now I'm up and running and I now consider myself better informed so thanks again
 

zgfg

Senior Member
Oct 10, 2016
7,378
4,771
Incidentally, it would be very helpful to this effort if other MIUI users could try to bypass Sparkasse banks S-PushTAN app's detection and report. See post above. 👍 PW
If you were provoking me, ok I tested again. Did everything as maybe a month ago when S-PushTAN did not detect root on my phone

I installed S-PushTAN, and before opening:
- enabled DenyList and added S-PushTAN to DenyList
- disabled DenyList (because I use Shamiko)
- in HMA, under Select Effective Apps, opened S-PushTAN, enabled Hide, checked: BlackList, All hide methods and applied my template (list of apps that S-PushTAN must not see) where I list Magisk app and all my LSPosed modules.
I do not list LSPosed itself in the template because I use their 'parasitic' method (delete LSPosed app and create a shortcut instead)

Then I rebooted and opened S-PushTAN but this time it redirected me to the browser, complaining about unsecure phone/root

Still, it should be possible: to uninstall S-PushTAN, find on ApkMirror the older version of S-PushTAN (for whom hiding Magisk app by HMA worked), and configured everything for that older version of S-PushTAN

Then additionally to detach (=hide, again by HMA) S-PushTAN from Google Play, to prevent bothering about updates availability.
Hoping that the bank will not block that older version of S-PushTAN soon

I'm not going to push the envelope since I don't really need S-PushTAN
 
  • Like
Reactions: ipdev

pndwal

Senior Member
If you were provoking me, ok I tested again.
Please be assured that I make every effort not to provoke you. 😬
Did everything as maybe a month ago when S-PushTAN did not detect root on my phone

I installed S-PushTAN, and before opening:
- enabled DenyList and added S-PushTAN to DenyList
- disabled DenyList (because I use Shamiko)
- in HMA, under Select Effective Apps, opened S-PushTAN, enabled Hide, checked: BlackList, All hide methods and applied my template (list of apps that S-PushTAN must not see) where I list Magisk app and all my LSPosed modules.
I do not list LSPosed itself in the template because I use their 'parasitic' method (delete LSPosed app and create a shortcut instead)

Then I rebooted and opened S-PushTAN but this time it redirected me to the browser, complaining about unsecure phone/root
Same results here despite throwing whole kit and caboodle at HMA apps invisible list... Have a feeling PTAN now detects something in addition to apps... some isolated process leak unique to MIUI?
Still, it should be possible: to uninstall S-PushTAN, find on ApkMirror the older version of S-PushTAN (for whom hiding Magisk app by HMA worked), and configured everything for that older version of S-PushTAN

Then additionally to detach (=hide, again by HMA) S-PushTAN from Google Play, to prevent bothering about updates availability.
Hoping that the bank will not block that older version of S-PushTAN soon

I'm not going to push the envelope since I don't really need S-PushTAN
Yup, a downgrade may be best option for German MIUI users...

My purpose however is simply to determine what extra hiding may be needed for MIUI as opposed to other devices since others don't seem to have this difficulty... I suspect it is likely related to extra traces detected by MOMO for MIUI when it works... Momo is broken (crashes) for me w/ Zygisk & MOMO hidden ATM.

Thanks for confirming this method is not working for you either... I think you have Android 11; I have 10, so confirms it's not the different API level... Does MOMO work for you?...

Hope to see some fixes in updates to MOMO / Shamiko. Shamiko already hides isolated process w/ always unshare, but seems hasn't overcome MIUI anomalies yet. 😕 PW
 
Last edited:
  • Like
Reactions: XDA075 and ipdev

pndwal

Senior Member
I even added Shamiko to give it a whirl but it seemed to behave similarly to what Magisk deny + USNF were doing...
Well it was produced since USNF to fulfill a completely different need, initially to hide Zygisk and Zygisk modules as these were not hideable initially (just as Riru / Riru modules were detectable until RiruHide was incorporated in Ritu), and later hiding for other indicators of Magisk root and Isolated process leaks (unshare) as well as support for whitelist hide list mode (as existed in deprecated vvb2060 Lite Magisk builds) have been added.
https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-86306355
LSPosed seemed like a whole new rabbit hole to go down so I'd skirted that but I will follow the breadcrumb trails you've set out for me.
Official Zygisk-LSPosed is still not out, but CI builds have worked fine for some time. See artifacts in latest actions here:
https://github.com/LSPosed/LSPosed/actions
or go here:
https://t.me/LSPosedArchives

🙂 PW
 

zgfg

Senior Member
Oct 10, 2016
7,378
4,771
Please be assured that I make every effort not to provoke you. 😬

Same results here despite throwing whole kit and caboodle at HMA apps invisible list... Have a feeling PTAN now detects something in addition to apps... some isolated process leak unique to MIUI?

Yup, a downgrade may be best option for German MIUI users...

My purpose however is simply to determine what extra hiding may be needed for MIUI as opposed to other devices since others don't seem to have this difficulty... I suspect it is likely related to extra traces detected by MOMO for MIUI when it works... Momo is broken (crashes) for me w/ Zygisk & MOMO hidden ATM.

Thanks for confirming this method is not working for you either... I think you have Android 11; I have 10, so confirms it's not the different API level... Does MOMO work for you?...

Hope to see some fixes in updates to MOMO / Shamiko. Shamiko already hides isolated process w/ always unshare, but seems hasn't overcome MIUI anomalies yet. 😕 PW
Momo does not crash for me (yes, it is listed in DenyList).

And it works, actually 'better' than ever before - it detects everything as on the screenshot

-I still run the same Xiaomi.eu A11 (no more upgrades for my phone)
- same Momo 4.0.1 as before

- Newer Magisk Alpha (latest 24001), newer Shamiko (latest 73) and the latest by one LSPosed

And what was improved?

Actually, to the contrary - Momo now detects one more item "Found Magisk" that was not detected like two months or so ago

(For others:
Please don't start teaching me that I need this or that. I wasted a lot of time on Momo long ago and tried everything that you would advise me now

And I don't want to get involved now into discussions about the background: MIUI, odex vs deodex ROMs, etc

But I don't really care about Momo and its detections - I have already frozen the Momo back, let it sleeps for the long winter)
 

Attachments

  • Momo.jpg
    Momo.jpg
    359.6 KB · Views: 313
Last edited:
  • Like
Reactions: ipdev and pndwal

pndwal

Senior Member
Momo does not crash for me (yes, it is listed in DenyList).

And it works, actually 'better' than before - it detects everything as on the screenshot

-I still run the same Xiaomi.eu A11 (no more upgrades for my phone)
- same Momo 4.0.1 as before

- Newer Magisk Alpha (latest 24001), newer Shamiko (latest 73) and latest by one LSPosed

And what was improved?

Actually, to the contrary - Momo now detects one more item "Found Magisk" that was not detected like two months or so ago
Yup, it was similar for me when I could see results. (Broke with 72 Shamiko)...

Suspect something in MIUI allows detection of Magisk / Unlocked bootloader as other devices evade these... Possibly Magisk one is the culprit if you're correct about it being newly found; I don't recall... PW
 
  • Like
Reactions: ipdev

VD171

Senior Member
Jun 21, 2012
2,684
2
1,943
127.0.0.1
LG K10
Samsung Galaxy J7
Any magisk hider, please?
Edit: About how hiding root actually?
I've installed Magisk v24.1, LSPosed v1.7.2, Shamiko v0.4.3, XPrivacyLua v1.30 and everything is working perfectly.
I can hide root, xposed and zygisk, using it, please read my reply:
 
Last edited:
  • Like
Reactions: edufpaz

zgfg

Senior Member
Oct 10, 2016
7,378
4,771
Yup, it was similar for me when I could see results. (Broke with 72 Shamiko)...

Suspect something in MIUI allows detection of Magisk / Unlocked bootloader as other devices evade these... Possibly Magisk one is the culprit if you're correct about it being newly found; I don't recall... PW
Magisk General thread, Dec 6, post #49346:
https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-86055073

On the screenshot you can see that "Found Magisk" was not present

At that time I was running Alpha 23015 and some earlier versions of Shamiko and LSPosed. All the rest regarding Magisk, modules, LSPosed and its modules, root apps was the same
 
  • Like
Reactions: XDA075 and pndwal

pndwal

Senior Member
Magisk General thread, Dec 6, post #49346:
https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-86055073

On the screenshot you can see that "Found Magisk" was not present

At that time I was running Alpha 23015 and some earlier versions of Shamiko and LSPosed. All the rest regarding Magisk, modules, LSPosed and its modules, root apps was the same
Yup; ... But seems I had both bootloader and Magisk detection then... thanks for reminder... perhaps nothing has changed w/ miui since Zygisk; just better PushTAN detection... Good to see the girls club working on improving Shamiko hiding though... PW
 

pndwal

Senior Member
sorry, maybe i have missed, but how did you hide unlocked bootloader?
Momo and Key Attestation (both from vvb2060) detects it while other detections are successfully hidden.

A12+magisk canary zygisk+shamiko+usnf
That's what we've been discussing; seems USNF / Shamiko combination works as advertised for many devices (USNF hides enough to 'fix' SafetyNet, Shamiko hides more signs of unlocked bootloader, Magisk etc properly). Some seem to be able to achieve completely 'happy Momo' (MOMO detector says 'Environment is normal' / detects nothing suspicious) on some devices, eg RealMe.

With MIUI (Xiaomi) on the other hand, this seems difficult; we get a number of detections. I haven't been able to hide unlocked bootloader or Magisk from MOMO with Zygisk, although both Rootbeer Fresh and Rootbeer Sample detect nothing. PW
 
Last edited:

Eng.Raman

Senior Member
Apr 13, 2014
473
563
Khanaqin
Not sure if it's actually debug massages, but good analysis... You could say which bank / app you're using!...

Bank apps / devs requiring TEE are resorting to more and more clever tricks to detect / indicate a modified execution environment due to lack of confidence in SafetyNet API for obvious reasons.

It seems many are following Sparkasse banks S-PushTAN trick to detect even hidden / obfuscated Magisk app now as use of this app is universal w/ Magisk root.

Detecting applist should be prevented in theory since Android 11, but in practice some are still able to do this using some trickery, eg using Intent queries instead of API requests. Also, some like Sparkasse bank S-PushTAN can detect the hidden ('fully obfuscated") Magisk App by detecting the classes.dex code which does not change (unlike the package name) and can be used to identify the app. Their protection engine (Promon) seems to employ simple pattern matching on installed apps.

I was able to properly hide the already 'hidden' Magisk app (with Intent query hiding set) from S-PushTAN (and it would load) by using Hide My Applist LSPosed module. Hiding the unhidden app this way doesn't work (can app find package name etc even with HMA set?).

I have since discovered LSPosed HMA solution is no longer working for S. PushTAN since 3.5.2 on my MIUI device:
https://github.com/topjohnwu/Magisk/issues/1084#issuecomment-1013811582

Other MIUI users report report the same problem, but users of non MIUI
devices found PushTAN detects more apps but they could still subvert the detection simply by adding HMA app itself and other apps they used (GameGuardian etc) to HMA 'apps invisible' list for S. PushTAN. See issue thread above... PW
Incidentally, it would be very helpful to this effort if other MIUI users could try to bypass Sparkasse banks S-PushTAN app's detection and report. See post above. 👍 PW
The latest play store version of S-pushTAN 3.5.2 works well on my phone using Magisk Canary Beta 24.0 and HMA LSPosed module. :)(y)
 

Attachments

  • Screenshot_2022-01-27-1.jpg
    Screenshot_2022-01-27-1.jpg
    261.8 KB · Views: 318
  • Screenshot_2022-01-27-2.jpg
    Screenshot_2022-01-27-2.jpg
    161.1 KB · Views: 273
  • Screenshot_2022-01-27-3.jpg
    Screenshot_2022-01-27-3.jpg
    262.1 KB · Views: 308
  • Screenshot_2022-01-27-4.jpg
    Screenshot_2022-01-27-4.jpg
    318.1 KB · Views: 315

pndwal

Senior Member
The latest play store version of S-pushTAN 3.5.2 works well on my phone using Magisk Canary Beta 24.0 and HMA LSPosed module. :)(y)
Thanks! ... Guess you have public Beta if 24.0. (The debug logging enabled synchronised Canary version is 24001.)

Please remind me what phone you have; MIUI OS that appears to have issues with HMA method now while other devices / OSs can pass easily. Also, can you show us Momo screenshot? 👍 PW
 
Last edited:
  • Like
Reactions: Eng.Raman

Eng.Raman

Senior Member
Apr 13, 2014
473
563
Khanaqin
Thanks! ... Guess you have public Beta if 24.0. (The debug logging enabled synchronised Canary version is 24001.)

Please remind me what phone you have; MIUI OS that appears to have issues with HMA method now while other devices / OSs can pass easily. 👍 PW
My phone details in my signature ( + installed LSPosed zygisk variant with 11 modules / 4 magisk modules: busybox, Enhance mode for HMA, Shamiko Mod, and Zygisk-LSPosed ).
 
  • Like
Reactions: XDA075 and pndwal

Top Liked Posts

  • 2
    that's a bit too far fetched, I also asked on the XDA discord and they told me to use Island, which worked.
    Well, using a work profile is more than just freezing the Magisk app, isn't it? Anyway, some people who need to reserve work profile for company use (like my case), cannot use island. And to clarify, I was suggesting to disable (i.e. freeze) the Magisk app, not Magisk itself.
    2
    that's a bit too far fetched, I also asked on the XDA discord and they told me to use Island, which worked.
    Not clear if you used/tried Hide the Magisk app in App settings...

    Also, using HMA LSPosed module to further hide already hidden Magisk App also works for many bank apps... PW
    2
    Fox's Magisk Module Manager updated to 0.5.3

    2
    Turning off magisk might break my other apps.

    Zygisk was on as well as LSPosed and Shamiko was turned on the whole time and it didn't work.
    Please distinguish Magisk from Magisk app = former Magisk Manager

    You even uninstall Magisk APPLICATION but Magisk, all its modules, root Grants, DenyList continue working as you previously configured.
    Any time you install Magisk APK back. you continue using it

    App is only user interface to make you managing the Magiske more easier - otherwise, you would need to use Magisk CLI )command line interface)
    1
    Anyone know what I need to get around Hang Seng bank's detection? Safteycheck is all good, but putting the app in denylist as well as closing almost all services in servicely doesn't work. Installing shamiko and turning off denylist doens't work either.
    Try disabling the Magisk app.
  • 15
    @ipdev can you add https://github.com/mywalkb/DenylistUnmount to this post, as an open source alternative to Shamiko? Many users are posting positive results with this module.
    I bookmarked it the other day when I ran across the link in a different thread. 🙃
    I added Denylist Unmount to Points of Interest.

    Unfortunately my time has been short lately. 🙁
    Life and sidetracked by other projects.

    I have been meaning to update Post #9 for awhile now.
    Post #9 was to be a catch all post for additional links recommended in the threads.
    I have been trying to figure a good way to format/layout and categorize it.​

    This is my current WIP.
    Still needs to be formatted better. The secondary title needs to be reworded. Add/reword descriptions.
    Other cleanup and format/layout.

    Points of Interest.
    Apps, Links, Modules, Posts and Threads.
    Additional links recommended by the xda family.

    Apps

    Hide My Applist
    Hide apps or reject app list requests.
    Requires Xposed.​
    Download Links:
    GitHub | PlayStore

    Oprek Root Detector
    Check Devices Health​
    Download Links:
    PlayStore

    Magisk Modules

    Denylist Unmount
    Unmount the denylist processes​
    Download Links:
    GitHub

    LSPosed
    Systemless Xposed framework.
    Zygisk releases are now included.
    Releases
    Download Links:
    GitHub

    Shamiko
    Add description​
    Download Links:
    GitHub

    xda Posts

    xda Threads

    Other


    Note(s)
    • Xposed is a framework for modules that can change the behavior of the system and apps without touching any APKs.

    Cheers. :cowboy:
    9
    Anyone here have issue with latest version of Shamiko and some banking apps?
    My Starling app keeps closing itself when I have enabled Shamiko but if I disable it and revert to enforce denylist the app works fine but one of my other apps does not work without shamiko!
    Try using my build, turn off zygisk (optional) and enable MagiskHide.

    About Zygisk: Zygisk is still not perfect for hiding and zygisk leave very obvious traces for some apps such as Livin by Madiri (only work without zygisk). The problem is not "root is not hidden" but "Zygisk is not hidden". Riru has RiruHide to hide itself from scanning /proc/<pid/maps but Zygisk doesn't have hiding method and DenyList doesn't hide zygisk. If you are using LSPosed, recommended to use Riru for now.


    If you apps are still detecting root, try install Riru - MomoHider: https://github.com/HuskyDG/Riru-Momohider/releases/tag/0.0.8-all-configs
    8
    Points of Interest.

    LSPosed
    Zygisk releases are now included.
    Download Links:

    Shamiko
    Download Links:
    @ipdev can you add https://github.com/mywalkb/DenylistUnmount to this post, as an open source alternative to Shamiko? Many users are posting positive results with this module.
    8
    a new safetynet update has been released https://github.com/kdrag0n/safetynet-fix/releases
    thanks to kdrag0n and osm0sis and benjibobs
    6
    Today I upgraded to Magisk 24, on my device I have also LSPosed.
    In previous version riru and magisk hide was separated, so I could hide root for an app and hook with lsposed, now if I put the app in denylist, lsposed is not working.
    I see many people use shamiko for hide root and continue to use lsposed, but I don't like because it's closed source.
    I found an alternative DenylistUnmount (open source) is not perfect as shamiko but I think is good for many apps. I installed about 30 banking apps and only one detect root with DenylistUnmount but root is detected also with shamiko. So also shamiko is not perfect.
    Has anyone tried this module yet?
  • 117
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    62
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    57
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    52
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.


    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    43
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​