How to hide Magisk from root detections (Magisk v24 and up)

Zygisk’s DenyList allows you to hide apps from detecting Magisk and root, prevent showing incompatile device or fake bugs such as crashes, stuck, connection error. DenyList is basically MagiskHide, but doesn’t 100% hide. Some apps may still detecting it

This tutorial is for official Magisk only. If you are using Magisk-Delta, you are in the wrong place, please read this tutorial: https://www.andnixsh.com/2023/06/how-to-hide-magisk-delta-from-root.html

Hiding Magisk App

Let’s start hiding Magisk app first

Open Magisk-Delta and open settings on the top-right corner

Screenshot_20230602-110628.png

Under App sction click on Hide the magisk app

Screenshot_20230602-110647.png

You will be prompted how the app should be called. The default name is Settings. Click OK when you are done

Screenshot_20230602-112307.png

Please wait for a few seconds. Don’t do anything until it relaunches. After it relaunches, it may prompt you if you want to create a shortcut to your home screen. Click OK if you want to create a shortcut

Screenshot_20230602-120055.png

Then click Add automatically

Image 1644064871.png

Installing hiding modules

There are 2 hiding modules for Magisk, Shamiko and MagiskHide. I recommended you try Shamiko first. If something does not work, you can try switch to MagiskHide.

DO NOT USE BOTH MODULES SIMULTANEOUSLY, OTHERWISE ALL APPS WILL STOP WORKING AND MAY BRICK YOUR DEVICE. PLEASE ONLY HAVE ONE OF HIDING MODULE ENABLED

Shamiko module:
Open settings. Scroll down to Magisk section and enable Zygisk

Screenshot_20230602-112338.png

Download Shamiko zip file to your device. If you downloaded zip file using pc then connect your device with pc using a data cable and transfer it to the device.

Download link: Releases · LSPosed/LSPosed.github.io

Go to Modules section

Screenshot_20230602-1106282.png

Click on Install from storage option

Screenshot_20230602-111128.png

Select downloaded Shamiko zip file

Screenshot_20230602-111142.png

Confirm the installation

Screenshot_20230602-111151.png

After installation, simply click on the reboot button and your device will get rebooted

Screenshot_20230602-111158.png

Open Magisk app, open settings. Scroll down to the Magisk sction click on Configure Denylist.

Screenshot_20230602-1123382.png

Choose the apps you want to hide from root detections

Screenshot_20230602-112416.png

That’s it, you have successfully installed Shamiko on your device.

MagiskHide module:
MagiskHide does not need Zygisk to be enabled. Which mean you can hide Magisk root without enabling Zygisk.

This module reads DenyList as hidelist, but DOES NOT need to enable Zygisk and Enforced DenyList. You can use this module when Zygisk is enabled also but it is meanless.

NOTE: Isolated process and app zygote is not handle-able on Android 10 and lower. So Android 11+ is recommended!

Download MagiskHide zip file to your device. If you downloaded zip file using pc then connect your device with pc using a data cable and transfer it to the device.

Download link: Releases · HuskyDG/MagiskHide

Follow the excat steps from above how to install the zip file. I won’t explain it here again

There are two way to modify denylist configuration without enabling Zygisk.

Configure Magisk apps

  • As Magisk app does not allow you to configure denylist when zygisk is off. You must toggle Zygisk on temporary (not reboot) to configurate denylist and toggle Zygisk off after done.
  • Screenshot_20230602-11233823.png

Configure by CLI

  • You can manage denylist by magisk --denylist.
  • To add pkg/process to denylist, use this command (example adding com.google.android.gms.unstable):
magisk --denylist add com.google.android.gms com.google.android.gms.unstable
  • To remove pkg/process to denylist, use this command (example removing com.google.android.gms.unstable):
magisk --denylist rm com.google.android.gms com.google.android.gms.unstable
  • Use magisk --denylist ls to view denylist configuration

Extras

Safetynet-fix module:
Universal SafetyNet Fix is a Magisk module to work around Google’s SafetyNet and Play Integrity attestation.

This module works around hardware attestation and updates to SafetyNet and Play Integrity CTS profile checks. You must already be able to pass basic CTS profile attestation, which requires a valid combination of device and model names, build fingerprints, and security patch levels.

If you still have trouble passing SafetyNet or Play Integrity with this module, spoof the profile of a certified device by copying ro.product properties. MagiskHide Props Config is an easy way to do so on Magisk v23 and older. This is a common issue on old devices, custom ROMs, and stock ROMs without GMS certification (e.g. Chinese ROMs).

Android versions up to 13 are supported, including OEM skins such as Samsung One UI and MIUI.

Download link: Releases · kdrag0n/safetynet-fix

This module can work as an Xposed module to hide apps or reject app list requests, and provides some methods to test whether you have hidden your app list properly.

Hide My Applist Xposed module
Hide My Applist can work as an Xposed module to hide apps or reject app list requests, and provides some methods to test whether you have hidden your app list properly.

Tutorial: https://www.andnixsh.com/2023/06/how-to-bypass-hacking-tool-detections.html

Comments

Popular Posts

VMOS Pro Global CN FREE Custom ROMs | Gapps, ROOT, Xposed | Android 4.4.4, 5.1.1, 7.1.2, 9.0 ROMs | NO VIP

How to activate VMOS Assistant to run VMOS on Android 12 and above