[TEST] [ROOT] [Work-In-Progress] Disable DEFEX security on new Samsung devices

Search This thread

AndroDef

Senior Member
Oct 6, 2018
70
156
Damascus
IT IS NOT ALLOW TO SHARE ANYTHING FROM THIS THREAD WITHOUT MY PERMISSION (LINK TO THIS THREAD INSTEAD)
Thread will be updated continuously on each new Upgrade or new Device from Samsung.
Magisk / SuperSU patch defex test

Greetings for all,
In the explanation Here for new samsung security (Thanks for @defexer for that)

After some research i found an *EXACT* hex patch code to disable the defex security completely,
with using one hex code.

I rebuild Magisk from the source with injecting that hex patch code into boot patch process
and also added it to SuperSU patch script.

SAMSUNG Models that have the protection:
- Galaxy J6+ - 8.x.x - (SM-J610) - Temporarily solution
- Galaxy A9 2018 - 8.x.x - (SM-A920) - Tested
- Galaxy J7 2016 - 8.x.x - (SM-J710) - Tested
- Galaxy A7 2018 - 8.x.x - (SM-A750) - Tested
- Galaxy A9 Pro 2016 - 8.x.x - (SM-A910) - Tested
- Galaxy A8 / A8+ 2018 - 8.x.x - (SM-A530 / SM-A730) - Tested
- Galaxy J5 Prime - 8.x.x - (SM-G570) - Tested
- Galaxy J5 Pro - 8.x.x - (SM-J530) - Tested
- Galaxy J7 Core - 8.x.x - (SM-J701) - Tested
- Galaxy J7 Prime - 8.x.x - (SM-G610) - Tested
- Galaxy J7 Prime 2 - 8.x.x - (SM-G611) - Tested
- Galaxy J7 Pro - 8.x.x - (SM-J730) - Tested
- Galaxy Note 9 - 8.x.x - (SM-N960 - Base: RH & RI) - Tested

UPDATE: The patch was added to the official Magisk releases, Thanks for all testers
 
Last edited:

Albe96

Senior Member
Mar 10, 2016
3,023
4,088
Nice Idea To Patch Code Into Magisk!
 
Last edited:

meAlways

Member
Sep 27, 2018
7
2
DEFEX question and RMM

IT IS NOT ALLOW TO SHARE ANYTHING FROM THIS THREAD WITHOUT MY PERMISSION (LINK TO THIS THREAD INSTEAD)
Magisk / SuperSU patch defex test

Greetings for all,
In the explanation Here for new samsung security (Thanks for @defexer for that)

After some research i found an *EXACT* hex patch code to disable the defex security completely,
with using one hex code.

I rebuild Magisk from the source with injecting that hex patch code into boot patch process
and also added it to SuperSU patch script.

Waiting for any confirmation for the Not tested models.
Thanks in advance.

Hi Defexer,
In one reply to me you mentioned "... and disable the RMM state after it allows you to flashing custom binaries". I didn't understand what you meant. Could you pls explain? I am not very solid in flashing ROMs. So I need some help

OR

Now that you have done changes is that RMM part still necessary?

Hope hearing soon from you
Thanks
 

AndroDef

Senior Member
Oct 6, 2018
70
156
Damascus
Hi Defexer,
In one reply to me you mentioned "... and disable the RMM state after it allows you to flashing custom binaries". I didn't understand what you meant. Could you pls explain? I am not very solid in flashing ROMs. So I need some help

OR

Now that you have done changes is that RMM part still necessary?

Hope hearing soon from you
Thanks

First i'm not defexer.
The RMM state needs to be disabled in custom recovery after or before flash the root to avoid block again,
there is a RMM-Fix zip file on XDA flash it then remove this file
Code:
/system/bin/vaultkeeperd
 
  • Like
Reactions: _alexndr

turkal111

Member
Jan 4, 2018
10
3
Twrp have a problem with setting menu after install twrp with Odin Disintegrate setting menu plz rebuild magisk or su with .tar tnx
 

AndroDef

Senior Member
Oct 6, 2018
70
156
Damascus
j730f
if u install twrp can see setting menu
i cant send screenshot

Upload to the stock [boot.img] from your device ROM

Hey I tried this time bcoz I have your DonateMe :eek: button but unfortunately it shows
"Your recipient is not able to receive funds at this time. Your recipient must first set up his or her account to receive funds."

:crying::crying:

Thanks, I'm really appreciate your support.
I think there was a a problem with the account and now it is fixed
 

AndroDef

Senior Member
Oct 6, 2018
70
156
Damascus
i dont understand
after install twrp http://s9.picofile.com/file/8339593834/Screenshot_20181011_080810_Settings.jpg

magisk.tar md5 i cant convert magisk.zip to .tar so plz upload magisk.tar or superSu.tar for j730f oreo

Open your device firmware that you flash with odin (version 8) and extract boot.img.lz4 from it then upload it and send the link here

No, still same issue.

The PayPal support team told me that everything fine with it, I don't know whats happening maybe it is a network problem or security issue.
I'm sorry for that and I consider myself received it for your appreciation for my work
 

Top Liked Posts

  • There are no posts matching your filters.
  • 31
    IT IS NOT ALLOW TO SHARE ANYTHING FROM THIS THREAD WITHOUT MY PERMISSION (LINK TO THIS THREAD INSTEAD)
    Thread will be updated continuously on each new Upgrade or new Device from Samsung.
    Magisk / SuperSU patch defex test

    Greetings for all,
    In the explanation Here for new samsung security (Thanks for @defexer for that)

    After some research i found an *EXACT* hex patch code to disable the defex security completely,
    with using one hex code.

    I rebuild Magisk from the source with injecting that hex patch code into boot patch process
    and also added it to SuperSU patch script.

    SAMSUNG Models that have the protection:
    - Galaxy J6+ - 8.x.x - (SM-J610) - Temporarily solution
    - Galaxy A9 2018 - 8.x.x - (SM-A920) - Tested
    - Galaxy J7 2016 - 8.x.x - (SM-J710) - Tested
    - Galaxy A7 2018 - 8.x.x - (SM-A750) - Tested
    - Galaxy A9 Pro 2016 - 8.x.x - (SM-A910) - Tested
    - Galaxy A8 / A8+ 2018 - 8.x.x - (SM-A530 / SM-A730) - Tested
    - Galaxy J5 Prime - 8.x.x - (SM-G570) - Tested
    - Galaxy J5 Pro - 8.x.x - (SM-J530) - Tested
    - Galaxy J7 Core - 8.x.x - (SM-J701) - Tested
    - Galaxy J7 Prime - 8.x.x - (SM-G610) - Tested
    - Galaxy J7 Prime 2 - 8.x.x - (SM-G611) - Tested
    - Galaxy J7 Pro - 8.x.x - (SM-J730) - Tested
    - Galaxy Note 9 - 8.x.x - (SM-N960 - Base: RH & RI) - Tested

    UPDATE: The patch was added to the official Magisk releases, Thanks for all testers
    3
    boot img J701F Oreo 8.1
    drive.google.com/ open?id=1br5SlVOVRqL6UhflQ8-ee24tkbEdsDoM

    I put space before 'open?id=xxxx'
    Thanks

    https://mega.nz/#!TVxVSATK!OXtsXifvhaOvqcRMW83kpFaAdash9ax5fSEEYvM6VcQ

    Please I have flashed my Samsung Galaxy j7 Prime g610f with twrp 3.2.3 and had soft bricks. That's the phone refuses to boot pass the logo, and it kept vibrating. Below is a link to my stock firmware boot.img.

    There is a space between .com and /file/xxxx

    drive.google.com /file/d/1jUwfE7FyFjxawRveLkqymqew8sMYG34P/view?usp=drivesdk

    https://mega.nz/#!6B4nCSLR!tFN3FnUKppH0Yl80YjRXpJ9Qo5tu6yn4-a6qiUxsoao
    2
    DEFEX question and RMM

    IT IS NOT ALLOW TO SHARE ANYTHING FROM THIS THREAD WITHOUT MY PERMISSION (LINK TO THIS THREAD INSTEAD)
    Magisk / SuperSU patch defex test

    Greetings for all,
    In the explanation Here for new samsung security (Thanks for @defexer for that)

    After some research i found an *EXACT* hex patch code to disable the defex security completely,
    with using one hex code.

    I rebuild Magisk from the source with injecting that hex patch code into boot patch process
    and also added it to SuperSU patch script.

    Waiting for any confirmation for the Not tested models.
    Thanks in advance.

    Hi Defexer,
    In one reply to me you mentioned "... and disable the RMM state after it allows you to flashing custom binaries". I didn't understand what you meant. Could you pls explain? I am not very solid in flashing ROMs. So I need some help

    OR

    Now that you have done changes is that RMM part still necessary?

    Hope hearing soon from you
    Thanks
    2
    Seems everything is ok
    Baseband chek I can call
    Magisk test with mixplorer root access and its work
    Setting menu ok done
    Really thank you

    Good, thanks for test
    But please don't share the boot.img file out of xda
    1
    In general, I found a kernel already rutted and with defex disabled :)
    Kernel for firmware 8.1.0 models SM-T385 and T385M and T385C
    I will put the kernel in a zip archive, inside a tar archive that can be flashed via ODIN directly to the stock firmware, perform a data reset and use ...
    Titanium works with other programs, too, without asking for root rights ...
    P.S. on the approach of Android 9 Pie, the T385DXU3CSH4 firmware is already being tested :)
    and again there will be a question with obtaining Root rights