[Discussion] Magisk - The Age of Zygisk.

Search This thread

amn1987

Senior Member
ICICI Pockets latest version (9.4) instantly crashes on all my rooted devices(Magisk 24.3,Shamiko). Works fine in a device running stock MIUI. It's the only app that I haven't been able to tame. Old version 9.2 became non-functional from yesterday.
Edit: Just restricting "Get Applications" was sufficient to get the app working in a manner of speaking. The app in general is quite buggy and I haven't been able to complete the on-boarding process despite multiple tries.
Edit2: I was finally able to login after manually granting every permission beforehand.
 
Last edited:

J.Michael

Recognized Contributor
Jan 20, 2018
1,244
1,180
Samsung Galaxy Tab A series
ICICI Pockets latest version (9.4) instantly crashes on all my rooted devices(Magisk 24.3,Shamiko). Works fine in a device running stock MIUI. It's the only app that I haven't been able to tame. Old version 9.2 became non-functional from yesterday.
Edit: Just restricting "Get Applications" was sufficient to get the app working in a manner of speaking. The app in general is quite buggy and I haven't been able to complete the on-boarding process despite multiple tries.
Edit2: I was finally able to login after manually granting every permission beforehand.
What permissions are you granting?
 

meric57

Senior Member
Oct 2, 2017
178
35
Oeutrange
Samsung Galaxy Tab E
Hello, in momo 4.1.1 I have in detail "partition, mounted adnormally" I thought it came from the USB port no so it came from memory or partition

I have a problem with magisk every time I add third-party application LSposed example from zisgisk or others.
Magisk once restart no longer works magisk app non zigysk non ramdisk non normal.
There is no module that remembers the installation to reactivate without reflashing or integrating backup in magisk.
thank you
 
Last edited:

pndwal

Senior Member
... And I thought Mr 73Sydney was the spanner guy!...

Yeah, cute, open source too... But who needs it here? ("WebRTC native client that utilizes hardware encoders such as NVIDIA Jetson and Raspberry Pi to deliver high quality video such as 4K and 1080p with less than a second delay...")

Could be some licencing issues w/ the name... except 'our' Momo seems to originate in China... 🤔

Anyway, you get my new award for original answers designed to kerflummox -

Spanner.jpeg

😁 PW
 
Last edited:

slimshouki

Senior Member
Dec 5, 2012
727
145
I have tried every single solution mentioned here in the thread to hide root from this banking app Instapay but unfortunately always detect root despite all other banking apps are working.
I Have Latest Magisk Alpha 24310
Latest Shamiko 0.5.0 (112)
InitRcHider
HMA lsposed and magisk module hiding all root request apps and lsposed modules from banking apps
USNF
MagiskHide Props Config
Bromite webview replaced Android webview using magisk module
Zygisk on and enforcing denylist off
App runs normally if magisk hide on and zygisk is disabled
 

73sydney

Senior Member
... And I thought Mr 73Sydney was the spanner guy!...

Yeah, cute, open source too... But who needs it here? ("WebRTC native client that utilizes hardware encoders such as NVIDIA Jetson and Raspberry Pi to deliver high quality video such as 4K and 1080p with less than a second delay...")

Could be some licencing issues w/ the name... except 'our' Momo seems to originate in China... 🤔

Anyway, you get my new award for original answers designed to kerflummox -

View attachment 5620571

😁 PW

Hey, I want my spanner back!


....and Ponkles to all
 

dewa5227

Senior Member
Oct 31, 2010
232
66
Surabaya
OnePlus 6
Xiaomi Mi Pad 4
I have tried every single solution mentioned here in the thread to hide root from this banking app Instapay but unfortunately always detect root despite all other banking apps are working.
I Have Latest Magisk Alpha 24310
Latest Shamiko 0.5.0 (112)
InitRcHider
HMA lsposed and magisk module hiding all root request apps and lsposed modules from banking apps
USNF
MagiskHide Props Config
Bromite webview replaced Android webview using magisk module
Zygisk on and enforcing denylist off
App runs normally if magisk hide on and zygisk is disabled
already try island ?
 

Top Liked Posts

  • There are no posts matching your filters.
  • 6
    Latest Official TJW Canary (release) & Debug (debug) Magisk builds:

    Magisk (f42c089b) (25102)​

    • [MagiskInit] Fix a potential issue when stub cpio is used
    • [MagiskInit] Fix reboot to recovery when stub cpio is used
    • [General] Better data encryption detection
    • [General] Move the whole logging infrastructure into Rust

    Diffs to v25.1​

    • [MagiskInit] Fix a potential issue when stub cpio is used
    • [MagiskInit] Fix reboot to recovery when stub cpio is used
    • [General] Better data encryption detection
    • [General] Move the whole logging infrastructure into Rust
    https://github.com/topjohnwu/magisk-files/blob/8fce25209918072f18b5bb056c43f596f771324d/notes.md

    👍 PW
    5
    Is it possible to find out what an app detects? I have Shamiko 0.5.1 installed and somehow a banking app still detects root. This is the app: https://play.google.com/store/apps/details?id=ro.raiffeisen.eToken&hl=ro&gl=US
    I just tried it on my phone (stock rom, Magisk 24.3, Shamiko 0.5.0, USNF).
    Without doing anything, it detects root.
    Adding it to denylist, still detects root.
    Freezing the Magisk app, goes through!
    5
    How should I hide apps?
    ... its just an addon script that (attempts, as best possible) to hide whatevers in the Deny List
    Just to avoid confusion/ be clear, Shamiko does not hide apps (in denylist or otherwise)...

    It's akin to old MagiskHide, and hides traces of root from apps in the list...
    ### Introduction
    Shamiko is a Zygisk module to hide Magisk root, Zygisk itself and Zygisk modules like riru hide.

    Shamiko read the denylist from Magisk for simplicity but it requires denylist enforcement to be disabled first.
    @appleman_wp
    If you wish to hide apps detected by banks etc, try the Hide My Applist LSPosed module...
    I don't think Shamiko has a "Settings". I think you use the Magisk Manager app's deny list. If you do not "Enforce Deny List" in Magisk, then Shamiko will use Magisk's Deny List to tell it what to hide [traces of root] from.
    (Edits mine.)

    Generally Shamiko is used without settings / extra configuration.
    ### Usage
    1. Install Shamiko and enable Zygisk and reboot
    1. Configure denylist to add processes for hiding
    1. *DO NOT* turn on denylist enforcement

    However it can actually be reconfigured (by those game / mavericks 😛) for whitelist mode usage. Note caveats:
    #### Whitelist
    - You can create an empty file `/data/adb/shamiko/whitelist` to turn on whitelist mode and it can be triggered without reboot
    - Whitelist has significant performance and memory consumption issue, please use it only for testing
    - Only apps that was previously granted root from Magisk can access root
    - If you need to grant a new app root access, disable whitelist first

    ... ts theoretically possible to... bootloop your device... At which point myself and the other senior members will pass around the chalice of your tears and drink heartily from it...
    Sadist! 😜 PW
    5
    I just tried it on my phone (stock rom, Magisk 24.3, Shamiko 0.5.0, USNF).
    Without doing anything, it detects root.
    Adding it to denylist, still detects root.
    Freezing the Magisk app, goes through!
    It's now been reported a number of times that freezing the Magisk app helps thwart root detection in many cases.

    So ... I now believe that what we need to do is not talk about that publicly too much, so that the banking-and-other-kinds-of-app developers who might check these forums don't catch on to the fact the Magisk app itself doesn't actually provide any run-time Magisk functionality.

    This way, those developers will keep thinking that checking for the existence of a non-frozen Magisk app itself is sufficient.

    Given the intelligence level of some of the banking people who lamely think that it's important to block root access under Android in order to "protect" their provided banking functionality, this ruse might actually be quite effective in many cases.

    After all, anyone who accesses a bank via their desktop computer is doing so on a rooted machine, and those idiotic banking software designers don't even care about "protecting" us against that. And those same banks issue us debit cards that we carry in our stealable wallets, and they don't prohibit us from using those debit cards, either. They go crazy only over trying to protect people against rooted Android devices, which are no more insecure than desktop computers and wallet-borne debit cards.
    4
    Interesting. I'll check it out. In addition to creating root, I assumed that Magisk needed to be resident in at least some way to do its ongoing work related to app compatibility, but if it's frozen that's apparently not the case. If the only time that it needs to be unfrozen is when you need to change a setting/update a module etc., then that sounds like a good way to go.
    "Magisk" *does* need to be "resident". You have been advised to freeze "the Magisk Manager app".

    You can see if freezing could possibly help by uninstalling the Magisk app -- not Magisk, the Magisk app. If that solves your detection problem, you might find the freezing more convenient than repeatedly uninstalling/reinstalling.
  • 120
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    63
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    57
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    52
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.

    Play Intergrity API Checker
    This app shows info about your device integrity as reported by Google Play Services.
    If any of this fails could mean your device is rooted or tampered in a way (for example you have an unlocked bootloader).​

    Development:

    Download Links:

    Credits:
    1nikolas
    All who contribute and support this project.

    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    43
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​