Posts

Showing posts from 2023

List of Virtual Spaces for Android

Image
Virtual Space App creates an isolated virtual environment within a single device and provides an environment where the same app can run dually inside. With this Virtual Space, you can easily create dual apps because one app can be run through multiple instances, but there are also security problems inside Virtual Space. Suppose you install certain apps on the Virtual Space to use dual apps. In that case, the security sandbox is unlocked, all apps in the Virtual Space, allows accessing to each app’s usage area and memory, which exposes to hacking threats and malicious malwares. As long as you don’t install malicious apps inside Virtual Space, it should be safe Since there is no sandbox in Virtual Space, you may be able to hack apps and games inside Virtual Space. This is the reason tons of modders provided custom Virtual Space App or injectors for Virtual Spaces to hack games without root. Virtual Space is not the same as Virtual Machine. Virtual Machine runs its own operating system ...

How to root AVD (Android Virtual Device) with Magisk

Image
It is possible to root AVD (Android Virtual Device) with Magisk using rootAVD script. It works on Windows/Mac/Linux Requirements: Android Studio. See tutorial how to install it: Install Android Studio | Android Developers Have at least one AVD created and running with boot option set to “Cold boot”: Create and manage virtual devices | Android Studio | Android Developers A working Internet connection for the Menu Be able to use terminal/cmd rootAVD script (Direct link): https://gitlab.com/newbit/rootAVD/-/archive/master/rootAVD-master.zip Have ANDROID_HOME enviornment path set of your SDK path. Check the documentation for your operation system to learn how. Reference: Environment variables | Android Studio | Android Developers Note: You can’t use ARM images on x86 computer or vice versa. ARM only zygisk modules will not work on x86 AVD. Because Zygisk injects zygote, ARM translation can’t be supported, it is by design. Currently only x86 supported modules will work on x86...

How to fix Magisk modules deleting itself from Windows Subsystem for Android (WSA)

Image
This is a known bug: https://github.com/MustardChef/WSABuilds/issues/154 ) So this is how to temporary fix it: Be careful when using file manager on the data partition. Any user mistakes can brick WSA entirely, so please make a backup before proceeding Use any file manager of your choice. I’m using X-plore Make sure that root access with read/write is enabled in file manager settings if available (In X-plore: Root access must be “Superuser + Mount writeable”) First pane: Go to /data/adb/modules/(your installed module) Second pane: Go to /data/adb/modules_update/(your installed module) Copy all files and overwrite from /data/adb/modules_update/(your installed module) to /data/adb/modules/(your installed module) DELETE the file called “update” from /data/adb/modules/(your installed module) Repeat the same steps on other modules When you are done, DELETE the modules_update folder Reboot WSA via Magisk app. The modules should be working now Watch the video: https://s...

Magisk & root detection apps

Collection of Some Publically Available POC Apps to Detect Root/Magisk presence. These applications have following detections: Detect Magisk (com.darvin.security) https://github.com/apkunpacker/MagiskDetection/raw/main/DetectMagisk.apk “Magisk Detection” “Magisk Hide Detection” Hunter (com.zhenxi.hunter) v3.0: https://github.com/apkunpacker/MagiskDetection/raw/main/Hunter 3.0.apk v4.4.1: MagiskDetection/Hunter_4.4.1.apk at main · apkunpacker/MagiskDetection “Apk Signature Verification” “Magisk & Root Detection” “Sandbox & Sandbox Detection” “Frida & IDA Detection” “libc Memory Detection” “Unidbg Detection” “Key function inlinehook & got table Detection” “Anti-Debugging Detection” “ISO strong Detection” “Magisk Hide Detection” “Custom ROM Detection” Magisk Detector (io.github.vvb2060.magiskdetector) https://github.com/apkunpacker/MagiskDetection/blob/main/MagiskDetector_v3.0.apk “Magisk Detection” “Magisk Hide Detection” MinotaurPoc (icu.nullptr....

Core Patch 4.3e for Android 9

Image
The official version only supported Android 10-14 only. I just make some changes to support Android 9. Tested on phone and emulator. I did made a pull request, so hopefully the author of Core Patch will accept it Download: https://github.com/AndnixSH/CorePatch/releases Screenshots:

How to enable Zygisk on Android 12 emulators using Zygisk Next module (Magisk Delta)

Image
Currently, Zygisk does not work on Android 12 emulators. Enabling build-in Zygisk in Magisk settings would either brick the emulator or do nothing. Zygisk Next module is the solution, it is a standalone module implementation of Zygisk, providing Zygisk API support for KernelSU and a replacement of Magisk’s built-in Zygisk. Build-in Zygisk does work fine on emulators running Android 7 and 9. If it doesn’t work, use old version of Magisk Delta fdac22ba-delta(25210) . Note: MuMu 12 is not supported yet. Do not try installing Zygisk Next on MuMu 12, It will brick the emulator and you will lose your data!!! Use Riru module until then. Reference NoxPlayer A12 finally have zygisk · Issue #199 · HuskyDG/magisk-files IMGUI/MOD MENU MODULES ARE NOT SUPPORTED BECAUSE THOSE MODULES ONLY SUPPORT ARM PROCESSOR, ZYGISK AND ZYGISK NEXT DOES NOT SUPPORT ARM TRANSLATION, ONLY X86 MODULES WILL WORK ON X86 EMULATORS. THE ONLY WAY IS TO USE ARM COMPUTER LIKE RASPBERRY PI OR APPLE COMPUTER WITH SILI...

SAP (Split APKs Packer) v6.9.9 (Windows & Linux) - Merge split APKs into single APK

Image
Note, this tool is not mine. I just shared it from other site for archive purposes with safe download links that lasts longer. Source: https://forum.release-apk.com/viewtopic.php?f=23&t=99023 SAP (Split APKs Packer) Requirements: JRE/OpenJDK 1.8 or above Overview: A simple and fast tool to transform Android App Bundles into single Android Packages. DOWNLOAD: Mega: https://mega.nz/folder/zdQxwASY#UM1eMnUTZL4CDegX3zE_HA Box: https://app.box.com/s/7swkpazrrt338kum5bkpeqcr5545hyr9 Sbupload: https://sbupload.com/folder/1564/SAP HOW IT WORKS SAP uses Apktool to decode the resources of the files included in the bundle to be processed. Then it merges all these files into the base package folder before adjusting and correcting them. Apktool is used to build the single package, Uber-APK-Signer for zipAlign/sign processes. SAP doesn’t work on dynamic features but configuration modules only. INFO: SAP is a portable application ; all files present in its folder are necessary. F...