[Discussion] Magisk - The Age of Zygisk.

Search This thread

73sydney

Senior Member
Fwiw

Delta is not entirely without its own issues, chiefly for me occaisonally losing root in the background, leaving me with having to reset my damn Watch 4 twice a day (if i was lucky) during the 3 days i tested it - once the link to watch is severed by root detection, theres NO way to recover it without reset....i soon went back to 25 debug and zero issues...luckily my bank app doesnt detect using zygisk/shamiko.

i.e. nothing is perfect and its still (relatively speaking) early days for zygisk/shamiko and im sure other zygisk alternatives
 
Last edited:
  • Like
Reactions: rodken

vietmobi

New member
Jun 28, 2022
2
1
It detects Zygisk.
You need Magisk Hide, ie.Magisk Alpha/Delta
Thank, i try magisk delta, turn off zygisk and use magiskhide. It finally works.

IMG_20220629_211324_227.jpg
 
  • Like
Reactions: shoey63

proza

Senior Member
Sep 18, 2012
169
3
I have a moto G7 plus.
I installed the Pixel OS 12 Plus. I installed Magisk 25.1. I enabled both Zygisk and Enforce DenyList. In the DenyList, I only selected the Google Play Services, enabled all the items except com.google.android.gms.
I rebooted and installed module MagiskHidePropsConf-v6.1.2.zip. Rebooted and installed module safetynet-fix-Zygisk-v2.2.1.zip. Rebooted and use the terminal to change the props to Google Nexus 6P.
Rebooted, run Root Checker. It shows SafetyNet request Failed. CTS profile match N/A. Basic integrity N/A.
What else can I do to pass the safetynet?
 

zgfg

Senior Member
Oct 10, 2016
7,609
5,015
It says "Something went wrong, Attestation response timeout"
Do you have GApos in your ROM?
SafetyNet goes through Google Play Services - if missing, it cannot work

AFAIK, there was a MicroG version (an open source alternative to GMS) but it must be provided with the ROM, proper version, etc

I don't know the details and frankly Im not interested (I use stock or custom ROMs with GApps), but I recall it was discussed here and/or in the USNF or MHPC threads, You could search

If you do have GApps, turn off all possible firewalls, blockers, etc - SN is not checked locally, GMS must connect to the Google servers
 

proza

Senior Member
Sep 18, 2012
169
3
Do you have GApos in your ROM?
SafetyNet goes through Google Play Services - if missing, it cannot work

AFAIK, there was a MicroG version (an open source alternative to GMS) but it must be provided with the ROM, proper version, etc

I don't know the details and frankly Im not interested (I use stock or custom ROMs with GApps), but I recall it was discussed here and/or in the USNF or MHPC threads, You could search

If you do have GApps, turn off all possible firewalls, blockers, etc - SN is not checked locally, GMS must connect to the Google servers

From the website, it says "PixelExperience is an AOSP based ROM, with Google apps included"
I have disabled the firewall and paused the adaway.
 

zgfg

Senior Member
Oct 10, 2016
7,609
5,015
From the website, it says "PixelExperience is an AOSP based ROM, with Google apps included"
I have disabled the firewall and paused the adaway.
Here you have the official SafetyNet API specifcation:

You can see that no response or timeout means that somewhere in the request/response channel (call to GMS, call to Google servers, responses back) is broken.
It does not mean that CTS or Basic integrity fail (hence you cannot fix with USNF or MHPC), but there is no response (and therefore no verdict about - they might be perfectly passing if attestation channel was not broken)

If one SN checker fails to answer, it can be that that something is wrong with that checker (or they went over quota with the number of requests to Google today or so).
But if it happens to you with different SN checkers (YASNAC now works perfectly for me), the pipe is broken in your ROM or on your line

Eg, ask in the group where you took the ROM from, how they test and pass SN
 
  • Like
Reactions: J.Michael

rodken

Senior Member
Jan 11, 2010
1,001
391
{Mod edit: Quoted post has been deleted}
You need to be more specific:

-- What device are you utilizing
-- Which version of Android
-- Custom ROM or Stock
-- What steps did you take [if any] to mitigate the issue
 
Last edited by a moderator:

GreekPilot

Senior Member
Jun 12, 2008
230
61
OnePlus 9 Pro
Good morning everybody. With new Shamiko v0.5.1 (117), no zygisk detected.
 

Attachments

  • Screenshot_2022-07-01-08-22-45-95_8ecd68a317969a903887707449183b6f.jpg
    Screenshot_2022-07-01-08-22-45-95_8ecd68a317969a903887707449183b6f.jpg
    487.1 KB · Views: 76

aximili

Member
Jun 29, 2007
18
0
I can't get HMA to work. I have enabled it in LSPosed but I don't have the module in Magisk.
(I have tried installing it from the APK and from the Play Store)
Help please?

Screenshot_20220701-172526 HMA not activated.jpg
 
Last edited:

m0han

Senior Member
Apr 30, 2012
4,999
2,048
Did you checkbox all for momo processes in denylist?
This is how I have Momo configured in DenyList at the moment. The middle item was disabled after reading somewhere that it is advisable. (I don't recall where I read it.) Would my Momo situation change for the better if I enable that also?
 

Attachments

  • Screenshot_20220701_153402.jpg
    Screenshot_20220701_153402.jpg
    181.2 KB · Views: 65

dohanin

Senior Member
Mar 26, 2011
225
126
Sony Xperia X Compact
Xiaomi Mi Pad 4
This is how I have Momo configured in DenyList at the moment. The middle item was disabled after reading somewhere that it is advisable. (I don't recall where I read it.) Would my Momo situation change for the better if I enable that also?
Probably the same.

If you like to hide Init.rc, you can install another magisk module InitRcHider. Or use Shamiko which has included initrc hider since 0.4.3. Although it doesn't make much difference I guess as not many apps would try to look for it.
 

Top Liked Posts

  • 3
    Hello friends .
    I have a Redmi 9 (Global) Codename : Lancelot
    Installed magisk via custom recovery (twrp and shrp) and root is sucess , but zygisk doesnt work , when I enable it in settings and reboot , in magisk zygisk : no . I used official MIUI 11.0.4. 11.0.7 11.0.9 12.0.1 12.0.4 Android 10 and zygisk still no success , although it worked on Lineage 18.1 Android 11 and Pixel Experience 12.1 Plus but I want to use MIUI and I want it to be MIUI android 10 to be exact because of some complexity of android 11 in Xiaomi devices I avoid android 11 . now back to MIUI 12.5.6 Android 11 to see if works at all or not , then I'm gonna try EEA or Europe MIUI Roms But before that I'm here to see if others have the same problem with their Xiaomi ? If yes , any fixes yet ?

    Edit : Fixed by flashing latest Global MIUI Rom ,for almost a week I was looking for a way around Redmi 9 android 10 zygisk but was not successful . Switch to android 11 and it will work like a charm but I lost TWRP decryption in Android 11 my internal storage is encrypted while in TWRP . Didnt try EEA roms .
    I think you just need to Learn to Stop Worrying and Love the Bomb. 😜 ...

    The whole point is:
    You didn't keep the Machine
    a secret; You've told the world!...
    ... all is NOT lost!!!


    In case you still want Android 10 w/ root (downgrade again):

    Your issue is very similar to this (but root was lost also for some):
    https://github.com/topjohnwu/Magisk/issues/6095

    Fix just completed (by Canyie, who incidentally became an adult a few days ago! 😃 ); Affected Redmi Note 4 on A7, Realme 6 on A12, etc...

    Root fixed here:
    https://github.com/topjohnwu/Magisk/issues/6095#issuecomment-1207255175
    Zygisk fixed here apparently:
    https://github.com/topjohnwu/Magisk/issues/6095#issuecomment-1207369066

    You could try the early test build linked there...

    Fix merged in Magisk (still downstream of any releases) here:
    52ba6d1 Don't let remote errors crash Zygisk
    with a further fix merged for Zygisk loading in:
    1735a71 Use ANDROID_DLEXT_FORCE_LOAD to load second stage if possible

    You could try the final Actions run trial Magisk build here:
    Use `ANDROID_DLEXT_FORCE_LOAD` to load second stage if possible
    (build in artifacts .zip at end, need to log in to download.)

    ...Or just wait for next official Magisk release, most likely Canary...

    🤠 PW

    "I'm afraid I don't understand something. Is the Premier threatening to explode this if our planes carry out their attack?"
    "No sir. It is not a thing a sane man would do. The doomsday machine is designed to to trigger itself automatically."
    "But this is absolute madness, ambassador. Why should you build such a thing?"
    "There are those of us who fought against it, but in the end we could not keep up with the expense involved in the arms race, the space race, and the peace race. And at the same time our people grumbled for more nylons and washing machines. Our doomsday scheme cost us just a small fraction of what we'd been spending on defense in a single year. But the deciding factor was when we learned that your country was working along similar lines, and we were afraid of a doomsday gap."
    "This is preposterous. I've never approved of anything like that."
    "Our source was the New York Times."
    "Dr. Strangelove, do we have anything like that in the works?"
    2
    How to fix this A12L using magisk hide

    magisk alpha
    Edit:
    Oops, if Magisk Alpha you should better ask in Magisk Alpha thread:

    Alpha is proprietary fork, closed source and they manage a close Chinese Telegram support group

    Not many users here

    Generally some different settings than in the official TJW, but supposedly they removed the old MagiskHide and in that case you should use DenyList the same/similar way as described in the OP posts here for the official Magisk v24/v25
  • 6
    Latest Official TJW Canary (release) & Debug (debug) Magisk builds:

    Magisk (f42c089b) (25102)​

    • [MagiskInit] Fix a potential issue when stub cpio is used
    • [MagiskInit] Fix reboot to recovery when stub cpio is used
    • [General] Better data encryption detection
    • [General] Move the whole logging infrastructure into Rust

    Diffs to v25.1​

    • [MagiskInit] Fix a potential issue when stub cpio is used
    • [MagiskInit] Fix reboot to recovery when stub cpio is used
    • [General] Better data encryption detection
    • [General] Move the whole logging infrastructure into Rust
    https://github.com/topjohnwu/magisk-files/blob/8fce25209918072f18b5bb056c43f596f771324d/notes.md

    👍 PW
    5
    Is it possible to find out what an app detects? I have Shamiko 0.5.1 installed and somehow a banking app still detects root. This is the app: https://play.google.com/store/apps/details?id=ro.raiffeisen.eToken&hl=ro&gl=US
    I just tried it on my phone (stock rom, Magisk 24.3, Shamiko 0.5.0, USNF).
    Without doing anything, it detects root.
    Adding it to denylist, still detects root.
    Freezing the Magisk app, goes through!
    5
    I just tried it on my phone (stock rom, Magisk 24.3, Shamiko 0.5.0, USNF).
    Without doing anything, it detects root.
    Adding it to denylist, still detects root.
    Freezing the Magisk app, goes through!
    It's now been reported a number of times that freezing the Magisk app helps thwart root detection in many cases.

    So ... I now believe that what we need to do is not talk about that publicly too much, so that the banking-and-other-kinds-of-app developers who might check these forums don't catch on to the fact the Magisk app itself doesn't actually provide any run-time Magisk functionality.

    This way, those developers will keep thinking that checking for the existence of a non-frozen Magisk app itself is sufficient.

    Given the intelligence level of some of the banking people who lamely think that it's important to block root access under Android in order to "protect" their provided banking functionality, this ruse might actually be quite effective in many cases.

    After all, anyone who accesses a bank via their desktop computer is doing so on a rooted machine, and those idiotic banking software designers don't even care about "protecting" us against that. And those same banks issue us debit cards that we carry in our stealable wallets, and they don't prohibit us from using those debit cards, either. They go crazy only over trying to protect people against rooted Android devices, which are no more insecure than desktop computers and wallet-borne debit cards.
    5
    How should I hide apps?
    ... its just an addon script that (attempts, as best possible) to hide whatevers in the Deny List
    Just to avoid confusion/ be clear, Shamiko does not hide apps (in denylist or otherwise)...

    It's akin to old MagiskHide, and hides traces of root from apps in the list...
    ### Introduction
    Shamiko is a Zygisk module to hide Magisk root, Zygisk itself and Zygisk modules like riru hide.

    Shamiko read the denylist from Magisk for simplicity but it requires denylist enforcement to be disabled first.
    @appleman_wp
    If you wish to hide apps detected by banks etc, try the Hide My Applist LSPosed module...
    I don't think Shamiko has a "Settings". I think you use the Magisk Manager app's deny list. If you do not "Enforce Deny List" in Magisk, then Shamiko will use Magisk's Deny List to tell it what to hide [traces of root] from.
    (Edits mine.)

    Generally Shamiko is used without settings / extra configuration.
    ### Usage
    1. Install Shamiko and enable Zygisk and reboot
    1. Configure denylist to add processes for hiding
    1. *DO NOT* turn on denylist enforcement

    However it can actually be reconfigured (by those game / mavericks 😛) for whitelist mode usage. Note caveats:
    #### Whitelist
    - You can create an empty file `/data/adb/shamiko/whitelist` to turn on whitelist mode and it can be triggered without reboot
    - Whitelist has significant performance and memory consumption issue, please use it only for testing
    - Only apps that was previously granted root from Magisk can access root
    - If you need to grant a new app root access, disable whitelist first

    ... ts theoretically possible to... bootloop your device... At which point myself and the other senior members will pass around the chalice of your tears and drink heartily from it...
    Sadist! 😜 PW
    4
    Isn't there a way to hide root from Company Intune Portal app? I tried downgrading but it doesn't work... :(
    See this thread
    People are struggling to make it work (including me). Some have manually re-installed the previous version.
  • 120
    This is a discussion and help thread for the newer versions of Magisk.

    The main goal of this thread is to help users migrate to Magisk v24+
    • SafetyNet
      Basic integrity Pass
      CTS profile match Pass
    • Play Protect certification
      Device is certified

    Feel free to discuss or give links to other Magisk related issues.
    Fixes for gPay, banking apps and/or other apps and games that detect a 'compromised' Android system.
    Please try to restrain from discussing alternative (unofficial) Magisk builds that include changes that were removed or can not be included in the official Magisk builds. 🙃

    Please read John's State of Magisk (medium.com)

    Starting with the Magisk 23 (23010) canary builds.
    • MagiskHide is removed.
      MagiskHide masked the sensitive properties of the device to hide it from SafetyNet.
      Renaming (repackaging) the Magisk app is/was not part of MagiskHide.
      You still have the option to Hide the Magisk app under setting.​
    • Magisk Module online Repo is removed.
      The Magisk Module online Repo is still available and can be accessed outside of the Magisk app.​
    • Everything SafetyNet is removed.
      This includes the SafetyNet check that was incorporated into the Magisk app.​
    • Zygisk is introduced.
      Zygote + Magisk = Zygisk​
    • The Deny list replaces the Hide list.
      The Hide list (more or less) hid Magisk from the process on the list.
      The Deny list is similar but instead of hiding Magisk from the process, Magisk is unloaded so there is nothing to hide.​

    Starting with the Magisk 23 (23017) canary builds.
    • Magisk supports update channels per module.
      Each module can include it's own update link.​
    • Hide Magisk offline.
      You do not need internet connection to rename (repackage) the Magisk app.​

    What does this mean?
    Not much.
    It is just the next step in Magisk's development.
    Zygisk is a big step forward. ;)

    Even before these changes in Magisk, the xda family and the Android community have always been active and willing to share. :D

    Jump to Post


    This is post will be updated once Magisk v24 is released.
    63
    Magisk
    The Magic Mask for Android.

    Magisk Links:
    GitHub
    Release Notes

    Download Links:
    Stable and Beta releases.
    Canary
    • GitHub
      The notes.md file is the change log.
      The app-debug.apk is Magisk canary.
      Click on app-debug.apk and choose View Raw or click on the Download option.​

    Credits:
    topjohnwu
    All who contribute and support this project.
    57
    Modules

    MagiskHide Props Config
    This module allows you to add, change and adjust prop values systemlessly using Magisk.​

    MagiskHide Props Config Links:

    Download Links:

    Credits:
    Didgeridoohan
    All who contribute and support this project.


    Universal SafetyNet Fix
    It has been a year now since kdrag0n figured out how to 'trick' SafetyNet.
    This 'trick' has been implemented properly into quite a few custom roms.
    For custom roms that do not include it and/or stock roms, he turned it into a module.​

    Universal SafetyNet Fix Links:

    Download Links:

    Credits:
    kdrag0n
    All who contribute and support this project.
    53
    Apps

    Fox's Magisk Module Manager
    This app allows you to manage and install Magisk modules.
    Including from an online repo.​

    Fox's Magisk Module Manager Links:

    Download Links:

    Credits:
    Fox2Code
    All who contribute and support this project.

    Play Intergrity API Checker
    This app shows info about your device integrity as reported by Google Play Services.
    If any of this fails could mean your device is rooted or tampered in a way (for example you have an unlocked bootloader).​

    Development:

    Download Links:

    Credits:
    1nikolas
    All who contribute and support this project.

    YASNAC - Yet Another SafetyNet Attestation Checker
    YASNAC (short for Yet Another SafetyNet Attestation Checker) is an Android app that demonstrates SafetyNet Attestation API.​

    YASNAC Links:

    Download Links:

    Credits:
    RikkaW
    All who contribute and support this project.
    43
    Force Basic Attestation

    Newer devices are designed to support hardware attestation.
    Currently there is no way to hide the sensitive device properties when checked using hardware attestation.​

    To get around this, kdrag0n figured out how trick SafetyNet that the device does not support hardware attestation.
    SafetyNet will then fall back to check using basic attestation.

    Note:
    This method will work for devices that support hardware attestation and devices that do not.
    • Enable Zygisk.
    • Install the USNF module.
    • Reboot

    To keep posts short, the instructions are hid by spoiler tags.
    If you have not installed Magisk.
    Follow the installation link in the Magisk post.​

    Download the Universal SafetyNet Fix module.
    Download link is in the Modules post.​

    1. Enable Zygisk
      • Open the Magisk app.
      • Go to Settings.
      • Scroll down to the Magisk section.
      • Toggle Zygisk on.
      • Go back to the Magisk Home screen.
    2. Go to Modules.
      • Select Install from storage.
      • Navigate to the Universal SafetyNet Fix module zip file and select it.
    3. Reboot.

    The USNF module will adjust the sensitive props that are needed to pass SafetyNet.
    Depending on the device and system (ROM) configuration, you might need to adjust a few more.
    See the Adjust Prop values post.​