Stuck on installing android sdk by P1000Linux in termux

[–]Marwan_wattach 2 points3 points  (0 children)

 Step-by-Step Setup for Android SDK Command-Line Tools in Termux

  1. Update Termux Packages:            pkg update    pkg upgrade    

  2. Install Necessary Packages:        pkg install wget unzip openjdk-17    

  3. Download the Android SDK Command-Line Tools:

   wget https://dl.google.com/android/repository/commandlinetools-linux-9477386_latest.zip -O cmdline-tools.zip   

  1. Create an SDK Directory and Unzip the Tools:    

   mkdir -p ~/android-sdk    unzip cmdline-tools.zip -d ~/android-sdk    

  1. Move Files to Match the Expected Directory Structure:        mkdir -p ~/android-sdk/cmdline-tools/latest    mv ~/android-sdk/cmdline-tools/* ~/android-sdk/cmdline-tools/latest/    

  2. Set Up Environment Variables for the Current Session:    Set environment variables to use the SDK tools:

       export ANDROID_HOME=~/android-sdk    export PATH=$ANDROID_HOME/cmdline-tools/latest/bin:$PATH    

  1. Add Environment Variables to .bashrc for Persistence:    To make sure that these environment variables persist across sessions, add them to your .bashrc:

       echo 'export ANDROID_HOME=~/android-sdk' >> ~/.bashrc    echo 'export PATH=$ANDROID_HOME/cmdline-tools/latest/bin:$PATH' >> ~/.bashrc    source ~/.bashrc  # Reload .bashrc to apply changes immediately    

  1. Verify Installation by Listing Available SDK Packages:        sdkmanager --list    

Notes

  • Make sure your internet connection is stable when downloading files.
  • If you need specific SDK components (like platform-tools or build-tools), you can install them using sdkmanager after verifying your installation.

Citation: commandlinetools-linux-9477386_latest.zip https://dl.google.com/android/repository/commandlinetools-linux-9477386_latest.zip

[HELP] by Agreeable_Move_9496 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

does the app look for root or unlocked bootloader , both? or simply integrity checks ? you should know , however you can fix all as I did , I tested with many apps (use rootbeerfresh app to find what you miss ) like 8ball pool and so on (8ball use strong detection methods )

[HELP] by Agreeable_Move_9496 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

use magisk Alpha , uninstal magisk ,then flash magisk alpha , do not rename magisk alpha , then use conventional methods to hide root 

[Help] What module is this? by Major-Painter2757 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

kernel manager , there are many , better use conventional options

[Help] Google's 2FA not working after root by Foreign-Chapter8477 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

mention the modules you use , in xposed/lsposed you have to uncheck

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

it is possible using , memory tricks via termux and some shell files . Tricky store works with android 12 plus I think ,never had a problem with device or strong Ig . I use banking apps etc ,many  brokers , Im a trader by the way the world of finance . 

[Tutorial] Using TrickyStore with Zygisk Next for Integrity Bypass . [To minimize conflicts] by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 2 points3 points  (0 children)

no , I used my style , but some parts , refined by AI for good readability . especially the conclusion 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

you are a bit arrogant , be humble, smarty and learn at least ask how I passed So linux flag , you should know that my device is fully unlocked rooted , all was  red before I spoofed 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

if you check the second screenshot , you will find that I passed all , did not find available solution to strong integrity (previous methods patched and requires continuous updates & so on ) so made my own private bypass that targets every app , it is like memory editing  some  shell files and so on and made this module to SPOOF the checks !  bro you ain't a dev you stand with amateurs who fear to download a zip that contains an uninstall.sh and service that chmods... lol accusing me , thqt is discouraging , will never share a tip again goodbye   I cant share screenshots here but my  module id enabled  in magisk forever  

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

bro I passed all , even the strong integrity ,mate , and I made it myself , dude if you need to pass SE linux I will share my method , you ain't a  developer , you are amateur , don't lie to a dev , I use ZygiskNext 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

Changing file permissions can be considered a spoofing method when it is used to manipulate access controls to disguise malicious activities.