no, I didn't, it isn't available for 23 anyway I thinkWere you using Zygisk USNF module?; Won't be working w/ 23.0... PW
no, I didn't, it isn't available for 23 anyway I thinkWere you using Zygisk USNF module?; Won't be working w/ 23.0... PW
I meant 'were you using' as in before you downgraded... Also I've added to last post... PW
Getting black screen on latest v1.7.86 of this app. Suspect is new detection mechanism. Anyone can test?
Before this version is fine (v1.7.84). Pass safetynet, Shamiko, Added to deny list it just wont work on latest version.Touch 'n Go eWallet - Apps on Google Play
Spend, Save, Earn, and Invest conveniently - all in one app!play.google.com
Pixel 6 Pro Latest Nov patch, Magisk 25.2
It's not normal but there are SO MANY differences in Magisk v25 (starting with v24) compared to your old v22 or v23) that I really suggest you:A few years ago I installed Magisk v. 22 on my Note 9 (Android 10). Today I tried, using Magisk Manager, to update both the app and Magisk to the latest version (via direct installation).
However, while the app updated to v. 25.2, instead, Magisk updated to v. 23. Is this normal?
I thought Magisk would also update to v. 25.2 just like Magisk Manager.
Thank you for your response.It's not normal but there are SO MANY differences in Magisk v25 (starting with v24) compared to your old v22 or v23) that I really suggest you:
- search on XDA for Magisk Zygisk thread and carefully read OP posts to be aware what has changed, and what would you need to configure manually from scratch , etc
- since you have happily lived so far with that ancient Magisk v22, maybe you don't need to jump to all the new things (Zygosk, DenyList instead of MagiskHide, no more Modules repository, optional Shamiko, USNF, Hide My Apps), and/or maybe you have an old version of Android that Magisk or important new modules (Shamiko, LSPosed) will not support
Hi Guys,
I found the checks the HDFC Bank_11.1.5 app is performing for checking the root status, most of the stuff is obfuscated but we can get a glimpse of what is going around in the background.
Any suggestion to bypass this is much appreciated.
C++:package com.backbase.android.core.security; import android.content.Context; import com.backbase.android.core.utils.DoNotObfuscate; import com.backbase.p006a.C0843b; import lxl.C6232aa; @DoNotObfuscate /* loaded from: classes2.dex */ public class RootVerification { private C0843b rootUtils; private boolean rooted; public RootVerification(Context context) { this.rootUtils = new C0843b(context); } public boolean isRooted() { return this.rooted; } public RootVerification withBinaries(String[] strArr) { int length = strArr.length; int i = 0; while (true) { if (i >= length) { break; } else if (C0843b.m10159a(strArr[i])) { this.rooted = true; break; } else { i++; } } return this; } public RootVerification withBusyBoxBinary() { this.rooted = C0843b.m10159a(C6232aa.m1119a(22896)); return this; } public RootVerification withDangerousProps() { this.rooted = this.rootUtils.m10156b(); return this; } public RootVerification withDefaultCheck() { C0843b c0843b = this.rootUtils; this.rooted = c0843b.m10157a((String[]) null) || c0843b.m10155b(null) || C0843b.m10159a(C6232aa.m1119a(22897)) || c0843b.m10156b() || c0843b.m10154c() || C0843b.m10160a() || C0843b.m10152d(); return this; } public RootVerification withPotentiallyDangerousApps(String... strArr) { this.rooted = this.rootUtils.m10155b(strArr); return this; } public RootVerification withRootCloakingApps(String... strArr) { this.rooted = this.rootUtils.m10153c(strArr); return this; } public RootVerification withRootManagementApps(String... strArr) { this.rooted = this.rootUtils.m10157a(strArr); return this; } public RootVerification withRwSystem() { this.rooted = this.rootUtils.m10154c(); return this; } public RootVerification withSuBinary() { this.rooted = C0843b.m10159a(C6232aa.m1119a(22898)); return this; } public RootVerification withSuExist() { this.rooted = C0843b.m10152d(); return this; } public RootVerification withTestKeys() { this.rooted = C0843b.m10160a(); return this; } }
Thank you for your effort, at least I know that its not my problemill have a crack, also Pixel 6 Pro, though on A13
Update:
No bueno...even with Hide My Applist
Perhaps a Magisk Delta user will test for you.....
Fellow Malaysian here, and also before this new update, there are error code keep popping up, u notice? Like not even 1 second then it closed, maybe that was the detection mechanism but its not working yet, I installed the previous version of it for it to work temporary lolThank you for your effort, at least I know that its not my problem
Hey, u mean the stopped working dialog that appears and gone in seconds right. I solved that one by hiding all process in denylist, if not mistaken by default it only tick the first one.Fellow Malaysian here, and also before this new update, there are error code keep popping up, u notice? Like not even 1 second then it closed, maybe that was the detection mechanism but its not working yet, I installed the previous version of it for it to work temporary lol
My one still popping out even tho I alredi deny all the processes lol, even game like undecember still detected the root even I hide it alsoHey, u mean the stopped working dialog that appears and gone in seconds right. I solved that one by hiding all process in denylist, if not mistaken by default it only tick the first one.
fine hereMy one still popping out even tho I alredi deny all the processes lol, even game like undecember still detected the root even I hide it also
I only can hide it with shamiko, was on normal zygisk previously
I am on shamiko too, maybe they strengthen their security.I only can hide it with shamiko, was on normal zygisk previously
Still haven't been able to do this on Xiaomi RN8T... Please say your device / OS... Thanks, PWHello Guys,
[UPDATE]
I was able to bypass the root detection of this app using the following magisk module.
Magisk Module Name: InitRcHider
Reference URL: XDA Download Link: https://xdaforums.com/attachments/initrchider-zip.5472273/
Another TNG user here, I submitted a report to their developer team because I think it is app issues on latest version of TNG.Model: Xiaomi Mi A1 (tissot)
OS: Lineage (19-20221206-NIGHTLY-tissot)
Magisk version: 25.2
Magisk Modules:
LSPosed Module: Hide My Applist
- Advanced Charging Controller (ACC)
- Shamiko
- Systemless Hosts
- Universal SafetyNet Fix (Displax)
- Zygisk - LSPosed
Tested with Ruru and Momo (attached)
Not working with TnG ewallet (stuck at logo)
Will find resolution on Momo's findings and update here.
I have just recently came across shamiko since undecember, sword art online VS, TnG being detected, previously the old magisk hide and zygisk had no problem for me
Hello,
I hope this is the right place for my question
I updated LineageOS from lineage-21.0-20240320-nightly to lineage-21.0-20240417-nightly-gts4lvwifi on my Galaxy Tab S5e and now Zygisk won't start.
View attachment 6093418
View attachment 6093425
What can I do?
Best regards
Does LSPosed+ Zygisk work if all LSPosed modules are disabled? PWThank you. With LSposed disabled Zygisk runs, but it's LSposed why I need Zygisk :-(
BruhCould someone check with
Crashes for me. Other bank apps work OK.
Magisk alpha latest, lsposed latest, zygisk of magisk alpha, hma latest and shamiko
Welcome on board!It seems like the Zygote Injection is detectable now. For me the "Payback" app wont work anymore.
S20U, Android 13 latest security patch, Magisk Delta (Kitsune 26400), Magisk Hide, Zygisk, lsposed, HMA.
Anyone updated/installed RHB Mobile Banking Ver, 2.15.1? does it work with HMA and denylist enabled?
Well goodluck fixing your environment then..It seems like the Zygote Injection is detectable now. For me the "Payback" app wont work anymore.
PAYBACK - Karte und Coupons - Apps on Google Play
Even more points, exclusive coupons and...play.google.com
S20U, Android 13 latest security patch, Magisk Delta (Kitsune 26400), Magisk Hide, Zygisk, lsposed, HMA.
Source:
https://www.reddit.com/r/Magisk/comments/198c0hz
Can anyone try Singpass app again?
Not working for me on Magisk alpha latest, app in denylist, shamiko, passed device integrity, latest lsposed.
notes.md
file is the change log.app-debug.apk
is Magisk canary.app-debug.apk
and choose View Raw or click on the Download option.