Hello folks
I want to crack an apk logins and i use http canary and ssl bypasser(UnPinning 2.0) which require edxposed and riru - edxposed framework.
when ever i install the apk and try to crack the login panel by canary spoof and creating plugins then trying to login. the program instantly delete the magisk edxposed modules which helps the edxposed manager to support SSL UnPinner.
My question here, is there a solution to prevent this app from deleting magisk modules? Or is there any other alternative for SSL UnPinning 2.0?
Related
I have rooted my OP6 using the following guide:
https://forum.xda-developers.com/showpost.php?p=76633618&postcount=70
I have Magisk manager installed (obviously as part of the rooting process).
I see a list of available Magisk modules in Magisk manager. Similar modules are also available for the Xposed framework.
My question is : What's the benefit of installing Xposed framework and then Xposed modules v. installing similar Magisk modules using Magisk manager? I am new to Magisk but have used Xposed modules in the past.
Thank You!
Magisk will keep SafetyNet passing, so if you using Android Pays and others apps that require SafetyNet to pass, Magisk is only option...
dustintinsley said:
Magisk will keep SafetyNet passing, so if you using Android Pays and others apps that require SafetyNet to pass, Magisk is only option...
Click to expand...
Click to collapse
Thank You!
Hi. I recently got banned from.Snapchat and now I want to uninstall that thing.
How do I do this correctly? (Have the Riru - Core, Riru - EdXposed Modules installed in Magisk + EdXposed Installer.apk).
SebiAi said:
Hi. I recently got banned from.Snapchat and now I want to uninstall that thing.
How do I do this correctly? (Have the Riru - Core, Riru - EdXposed Modules installed in Magisk + EdXposed Installer.apk).
Click to expand...
Click to collapse
Uninstall the app. Remove the modules in magisk.
Cm4nXD said:
Uninstall the app. Remove the modules in magisk.
Click to expand...
Click to collapse
Therer is an uninstaller for edXposed on the Github page. What about that?
EDIT: And ist the Framework still installed if I just uninstall the app and remove the modules?
SebiAi said:
Therer is an uninstaller for edXposed on the Github page. What about that?
EDIT: And ist the Framework still installed if I just uninstall the app and remove the modules?
Click to expand...
Click to collapse
edXposed's uninstaller is if you installed it in system. MAGISK is systemless.
MAGISK works by making a fake system partition, and tricking the device into booting it (Oversimplification). Upon boot modules are merged with system. This is what allows you to pass safety net. No changes actually effect system. Hence systemless.
If edXposed is installed as a MAGISK modules it isn't "installed" until device boot.
If you installed it with a MAGISK modules simply removing the MAGISK module will uninstall it.
Hi,
My question is simple, what is the difference between Xposed and EdXposed, and if there is a way to install it without loosing safety net.
My phone is a Oneplus 7 with android 10.
Thanks and best wishes for the new year!
EdXposed Framework allows to install XPosed Framework on devices running Android 10, Pie, and Oreo .
EdXposed requires your device must be rooted with Magisk v20.2+
By means of MagiskHide you can prevent SafetyNet's hardware attestion will fail.
jwoegerbauer said:
EdXposed Framework allows to install XPosed Framework on devices running Android 10, Pie, and Oreo .
EdXposed requires your device must be rooted with Magisk v20.2+
By means of MagiskHide you can prevent SafetyNet's hardware attestion will fail.
Click to expand...
Click to collapse
So it's impossible?
Biasio said:
So it's impossible?
Click to expand...
Click to collapse
Latest SafetyNet version not only checks for Android got rooted but also for device's bootloader got unlocked. The problem for John Wu - developer of Magisk - is that the new key attestation workflow now is hardware-based, and the code is sent by OEM to Google's server. May be some day he will find a solution ... it's unlikely that MagiskHide will be able to alter the key or intercept the transmission, IMHO.
Resume: Until then SafetyNet works as expected by OEMs and app developers, who have an interest in having an unmodified Android.
To add, you could try magisk module MHPC (Magisk Hide Props Config) which is what you'd use to modify device fingerprint and other system props.
The particular features in MHPC you may want to use which MIGHT get SafetyNet to pass are the Device Simulation and Force Basic Attestation. Combined, along with setting a similar device's fingerprint as long as that selected device isn't designed with hardware attestation, could be enough to fool SN. EdXposed coupled with Magisk's own Hide feature to hide themselves from GSF, GPS, Gpay, etc, should prove successful. The issue lies mostly with which order the software is installed and hidden, sometimes with rebooting being absolutely essential between certain steps. It really is a trial and error process.
Biasio said:
Hi,
My question is simple, what is the difference between Xposed and EdXposed, and if there is a way to install it without loosing safety net.
My phone is a Oneplus 7 with android 10.
Thanks and best wishes for the new year!
Click to expand...
Click to collapse
Turn Off Edxposed module from magisk download and install LSposed apk install it...Goto magisk and download module Riru LSposed...reboot your phone... That's It Check your safety net.... Dont forget to off or remove Edxposed module or any other xposed enhanced framework module you using...lemme know if it worked for you...
How does MagiskHide hide the bootloader status? I'm trying to find a way to replicate the same method with the latest canary release which has Zygisk instead of MagiskHide. Any help is appreciated.
It just changed a few props, all of which are integrated into MagiskHide Props Config (the "Edit MagiskHide props" option) and/or Universal SafetyNet Fix (which soon should be updated to work on Magisk build 23010+).
Didgeridoohan said:
It just changed a few props, all of which are integrated into MagiskHide Props Config (the "Edit MagiskHide props" option) and/or Universal SafetyNet Fix (which soon should be updated to work on Magisk build 23010+).
Click to expand...
Click to collapse
I just changed those props, it still fails attestation. It might be something different though, will check further. Thanks.
With Magisk Canary 23010 you'll also have to add the Play Services processes manually to the Deny list (gms and unstable). If you haven't done that, do so and try again. Could also be that you'll need to fool keystore to use basic attestation, but for those you'll have to use USNF v1.2.0 until the next release, since Riru doesn't play well with Zygisk.
Didgeridoohan said:
With Magisk Canary 23010 you'll also have to add the Play Services processes manually to the Deny list (gms and unstable). If you haven't done that, do so and try again. Could also be that you'll need to fool keystore to use basic attestation, but for those you'll have to use USNF v1.2.0 until the next release, since Riru doesn't play well with Zygisk.
Click to expand...
Click to collapse
Yeah, Riru apparently was the problem as when I removed Riru and downgraded Universal SafetyNet Fix ctsProfile now passes. Thanks for the aid!
Didgeridoohan said:
With Magisk Canary 23010 you'll also have to add the Play Services processes manually to the Deny list (gms and unstable). If you haven't done that, do so and try again. Could also be that you'll need to fool keystore to use basic attestation, but for those you'll have to use USNF v1.2.0 until the next release, since Riru doesn't play well with Zygisk.
Click to expand...
Click to collapse
Is there any update in 2022?
I'm using latest canary Magisk and latest USNF v2.2.1 on Android 11 but the unlocked bootloader is still detected.
Is there any solution? Thank you.
I have EdXposed Framework on my phone and Zygisk won't work with EdXposed Framework.
Is there any other way to hide root from apps without Zygisk and MagiskHide?
Never mind, I use RootCloak to hide root from apps now.