Fix Suspect Mount Detected (root detection)
1) Use MemoryDetector & Native Root Detector to know which modules are mounted to the system.
2) Flash magical_overlayfs
3) Change (
4) Now comes the dynamically loading detected modules using overlayfs image, Edit your detected modules (
5) Reflash the module and check MemoryDetector.
6) Do for all detected/mounted modules.
Fix Revanced mount detection:
1) Download & Flash Zygisk Proc Injection
2) Download YT Revanced Inject
3) Download & Install stock YT matching the inject version.
4) Flash YT Revanced Injection module.
5) Reboot and check if detected now.
How to update YT Revanced?
1) Change the module.prop (
2) Replace revanced.apk within your new Revanced APK within YT Injector module.
3) Installed version must be stock and match revanced.apk version.
4) Flash YT Injector and enjoy.
Notes:
YT Revanced Injector could in theory be used and modified to work with other Revanced mods.
If you use Revancify execute it with the parameter
If you still have the suspicious mount detected it must mean that your
Credit to HuskyDG and all the people in his group who help and share knowledge.
1) Use MemoryDetector & Native Root Detector to know which modules are mounted to the system.
2) Flash magical_overlayfs
3) Change (
/data/adb/modules/magisk_overlayfs/mode.sh) to (OVERLAY_MODE=2)4) Now comes the dynamically loading detected modules using overlayfs image, Edit your detected modules (
/META-INF/com/google/android/update-binary) and add the following noscript before the exit.5) Reflash the module and check MemoryDetector.
6) Do for all detected/mounted modules.
OVERLAY_IMAGE_EXTRA=0 # number of kb need to be added to overlay.img
OVERLAY_IMAGE_SHRINK=true # shrink overlay.img or not?
# Only use OverlayFS if Magisk_OverlayFS is installed
if [ -f "/data/adb/modules/magisk_overlayfs/util_functions.sh" ] && \
/data/adb/modules/magisk_overlayfs/overlayfs_system --test; then
ui_print "- Add support for overlayfs"
. /data/adb/modules/magisk_overlayfs/util_functions.sh
support_overlayfs && rm -rf "$MODPATH"/system
fi
Fix Revanced mount detection:
1) Download & Flash Zygisk Proc Injection
2) Download YT Revanced Inject
3) Download & Install stock YT matching the inject version.
4) Flash YT Revanced Injection module.
5) Reboot and check if detected now.
How to update YT Revanced?
1) Change the module.prop (
version=) in the Injector module so it matches your YT version.2) Replace revanced.apk within your new Revanced APK within YT Injector module.
3) Installed version must be stock and match revanced.apk version.
4) Flash YT Injector and enjoy.
Notes:
YT Revanced Injector could in theory be used and modified to work with other Revanced mods.
If you use Revancify execute it with the parameter
-n (rootless) to build the APK and not install it automatically.If you still have the suspicious mount detected it must mean that your
/data partition type is not f2fs. (su -c stat -f -c %T /data)Credit to HuskyDG and all the people in his group who help and share knowledge.
👍37👎25❤17😱6❤🔥1
Fix init.rc/ART and Recovery/Magisk detections
1) Search for (
2) Search for (
3) Search for (
Notes:
Before dirty updating your ROM rename those files and folders back to the original state.
Init.rc might also be due to (
Credit to HuskyDG and all the people in his group who help and share knowledge.
1) Search for (
/system/addon.d) and rename it.2) Search for (
/sdcard/TWRP) and rename it (Or your recovery name).3) Search for (
/vendor/bin/install-recovery.sh) and (/system/bin/install-recovery.sh) and rename it.Notes:
Before dirty updating your ROM rename those files and folders back to the original state.
Init.rc might also be due to (
/vendor/etc/init) which are prebuilt into your ROM by default.Credit to HuskyDG and all the people in his group who help and share knowledge.
❤39👎29👍15
Updated the build.prop project so that the OTA Downloader gets the right version, Also some other changes have been done so it works on Termux for Android. (Still ongoing some fixes)
GitHub
Fix OTA downloader and packages installer · Pixel-Props/build.prop@30d2ee3
This updates contain fixes for the OTA downloader which now uses google.com instead of .cn and a somewhat reworked grep to find the proper release (non-carrier build)
As well as an updated packa...
As well as an updated packa...
👎30❤10🔥3
Husky.A14.20231205.zip
3.8 KB
Pixel 8 Pro - Husky
Security Patch: 2023-12-05
ID: UQ1A.231205.015
Security Patch: 2023-12-05
ID: UQ1A.231205.015
👎36❤🔥18🏆5👌3👍2
Raven.A14.20231205.zip
3.8 KB
Pixel 6 Pro - Raven
Security Patch: 2023-12-05
ID: UQ1A.231205.015
Security Patch: 2023-12-05
ID: UQ1A.231205.015
👎35👍5😱5
Redfin.A14.20231105.zip
3.8 KB
Pixel 5 - Redfin
Security Patch: 2023-11-05
ID: UP1A.231105.001
Security Patch: 2023-11-05
ID: UP1A.231105.001
👎32👍13❤🔥1
Cheetah.A14.20231205.zip
3.8 KB
Pixel 7 Pro - Cheetah
Security Patch: 2023-12-05
ID: UQ1A.231205.015
Security Patch: 2023-12-05
ID: UQ1A.231205.015
👎35👍9❤🔥2❤2👌1
Shiba.A14.20231205.zip
3.8 KB
Pixel 8 - Shiba
Security Patch: 2023-12-05
ID: UQ1A.231205.015
Security Patch: 2023-12-05
ID: UQ1A.231205.015
👎38🤩10👍3❤1👌1
The detectability of LSPosed by third-party apps raises privacy and security concerns, reflecting unprofessionalism. This issue arises as developers created a native detection project, removed it later, and witnessed the emergence of forks of the original project. Unfortunately, my attempts to address this matter led to expulsion and a ban from their group. Advocating against this unfair and unprofessional practice is crucial, emphasizing its implications for privacy and security. (Kindly refrain from using vulgar language.)
Anti Magisk & Xposed by LSPosed dev canyie (Translated by HuskyDG)
XposedDetector
John Wu rebbutal: 1. 2. 3. 4.
MlgmXyysd rebbutal: 1. 2.
SilmVXposed & SPatch describe how LSPosed killed its upstream project
They even go to other peoples repositories to spam in order to promote their projects https://github.com/MlgmXyysd/kernel-assisted-superuser/pull/1
There are also countless Xposed modules that vanished from the WWW as they don't want it to exist.
(The module in question)
Anti Magisk & Xposed by LSPosed dev canyie (Translated by HuskyDG)
XposedDetector
John Wu rebbutal: 1. 2. 3. 4.
MlgmXyysd rebbutal: 1. 2.
SilmVXposed & SPatch describe how LSPosed killed its upstream project
They even go to other peoples repositories to spam in order to promote their projects https://github.com/MlgmXyysd/kernel-assisted-superuser/pull/1
There are also countless Xposed modules that vanished from the WWW as they don't want it to exist.
(The module in question)
👎122😱89👍26🫡19😢5
Raven.A14.20240105.zip
3.8 KB
Pixel 6 Pro - Raven
Security Patch: 2024-01-05
ID: UQ1A.240105.002
Security Patch: 2024-01-05
ID: UQ1A.240105.002
👎151👍11🔥3
Redfin.A14.20231105.zip
3.8 KB
Pixel 5 - Redfin
Security Patch: 2023-11-05
ID: UP1A.231105.001
Security Patch: 2023-11-05
ID: UP1A.231105.001
👎161👍8⚡5
Husky.A14.20240105.zip
3.8 KB
Pixel 8 Pro - Husky
Security Patch: 2024-01-05
ID: UQ1A.240105.004
Security Patch: 2024-01-05
ID: UQ1A.240105.004
👎181🫡29👍7😢1👌1
Shiba.A14.20240105.zip
3.8 KB
Pixel 8 - Shiba
Security Patch: 2024-01-05
ID: UQ1A.240105.004
Security Patch: 2024-01-05
ID: UQ1A.240105.004
👎202👍7❤🔥6❤3
Cheetah.A14.20240105.zip
3.8 KB
Pixel 7 Pro - Cheetah
Security Patch: 2024-01-05
ID: UQ1A.240105.004
Security Patch: 2024-01-05
ID: UQ1A.240105.004
👎293👍17❤🔥9😁3🌚3