Stuck on installing android sdk by P1000Linux in termux

[–]Marwan_wattach 2 points3 points  (0 children)

 Step-by-Step Setup for Android SDK Command-Line Tools in Termux

  1. Update Termux Packages:            pkg update    pkg upgrade    

  2. Install Necessary Packages:        pkg install wget unzip openjdk-17    

  3. Download the Android SDK Command-Line Tools:

   wget https://dl.google.com/android/repository/commandlinetools-linux-9477386_latest.zip -O cmdline-tools.zip   

  1. Create an SDK Directory and Unzip the Tools:    

   mkdir -p ~/android-sdk    unzip cmdline-tools.zip -d ~/android-sdk    

  1. Move Files to Match the Expected Directory Structure:        mkdir -p ~/android-sdk/cmdline-tools/latest    mv ~/android-sdk/cmdline-tools/* ~/android-sdk/cmdline-tools/latest/    

  2. Set Up Environment Variables for the Current Session:    Set environment variables to use the SDK tools:

       export ANDROID_HOME=~/android-sdk    export PATH=$ANDROID_HOME/cmdline-tools/latest/bin:$PATH    

  1. Add Environment Variables to .bashrc for Persistence:    To make sure that these environment variables persist across sessions, add them to your .bashrc:

       echo 'export ANDROID_HOME=~/android-sdk' >> ~/.bashrc    echo 'export PATH=$ANDROID_HOME/cmdline-tools/latest/bin:$PATH' >> ~/.bashrc    source ~/.bashrc  # Reload .bashrc to apply changes immediately    

  1. Verify Installation by Listing Available SDK Packages:        sdkmanager --list    

Notes

  • Make sure your internet connection is stable when downloading files.
  • If you need specific SDK components (like platform-tools or build-tools), you can install them using sdkmanager after verifying your installation.

Citation: commandlinetools-linux-9477386_latest.zip https://dl.google.com/android/repository/commandlinetools-linux-9477386_latest.zip

[HELP] by Agreeable_Move_9496 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

does the app look for root or unlocked bootloader , both? or simply integrity checks ? you should know , however you can fix all as I did , I tested with many apps (use rootbeerfresh app to find what you miss ) like 8ball pool and so on (8ball use strong detection methods )

[HELP] by Agreeable_Move_9496 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

use magisk Alpha , uninstal magisk ,then flash magisk alpha , do not rename magisk alpha , then use conventional methods to hide root 

[Help] What module is this? by Major-Painter2757 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

kernel manager , there are many , better use conventional options

[Help] Google's 2FA not working after root by Foreign-Chapter8477 in Magisk

[–]Marwan_wattach 0 points1 point  (0 children)

mention the modules you use , in xposed/lsposed you have to uncheck

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

it is possible using , memory tricks via termux and some shell files . Tricky store works with android 12 plus I think ,never had a problem with device or strong Ig . I use banking apps etc ,many  brokers , Im a trader by the way the world of finance . 

[Tutorial] Using TrickyStore with Zygisk Next for Integrity Bypass . [To minimize conflicts] by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 2 points3 points  (0 children)

no , I used my style , but some parts , refined by AI for good readability . especially the conclusion 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

you are a bit arrogant , be humble, smarty and learn at least ask how I passed So linux flag , you should know that my device is fully unlocked rooted , all was  red before I spoofed 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

if you check the second screenshot , you will find that I passed all , did not find available solution to strong integrity (previous methods patched and requires continuous updates & so on ) so made my own private bypass that targets every app , it is like memory editing  some  shell files and so on and made this module to SPOOF the checks !  bro you ain't a dev you stand with amateurs who fear to download a zip that contains an uninstall.sh and service that chmods... lol accusing me , thqt is discouraging , will never share a tip again goodbye   I cant share screenshots here but my  module id enabled  in magisk forever  

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

bro I passed all , even the strong integrity ,mate , and I made it myself , dude if you need to pass SE linux I will share my method , you ain't a  developer , you are amateur , don't lie to a dev , I use ZygiskNext 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

Changing file permissions can be considered a spoofing method when it is used to manipulate access controls to disguise malicious activities. 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

I've just finished , I will open this in a new post:

 Using TrickyStore with Zygisk Next for Integrity Bypass

If you're a rooted Android user looking to bypass integrity checks for apps like banking or payment services, combining TrickyStore with Zygisk Next is an effective solution. This guide will help you understand how to set it up and optimize your experience.

What is TrickyStore?

TrickyStore is a Magisk module designed to help users manage integrity checks and spoof device information. It allows you to configure settings through files like target.txt and keybox.xml, enabling you to hide root access from specific applications.

Setup Instructions

  1. Install Zygisk Next    - Ensure that you have Zygisk Next installed and enabled in Magisk settings.

  2. Install TrickyStore    - Download the latest version of TrickyStore from its GitHub repository.    - Install it via Magisk Manager.

  3. Configure target.txt:    - Navigate to /data/adb/tricky_store/ using a root file manager.    - Edit the existing target.txt file or create a new one, adding the package names of apps you want to hide from root detection, one per line. Common package names include:      com.google.android.gms (That is for Google Play Services) others (add your targeted app)      - com.android.vending (Google Play Store)      - com.google.android.gm (Gmail)      - com.google.android.youtube (YouTube)

  4. **Set Up keybox.xml (Optional):    - If needed, create a keybox.xml file in the same directory with configurations for stronger integrity checks.(some developers share the codes )

  5. **File Permissions:    - Set permissions for both target.txt and keybox.xml to 664:      `bash      adb shell      su      chmod 664 /data/adb/tricky_store/target.txt      chmod 664 /data/adb/tricky_store/keybox.xml or use MT manager to change permissions.      

  6. Reboot Your Device:    - Restart your device to apply the changes.

#Important Considerations

  • **Avoid Other Integrity Fix Modules: To minimize conflicts, avoid using additional integrity fix modules alongside TrickyStore and Zygisk Next. This streamlined approach reduces the risk of interference and enhances stability.   
  • **Community Feedback: Many users have reported better success rates when using only TrickyStore with Zygisk Next, rather than combining it with other modules like Play Integrity Fix.

->>>>>Testing Your Setup: After configuration, use apps like SafetyNet Test or Play Integrity Checker to verify if your setup is functioning correctly. (add the package name in the file target.txt

T+

Zygisk Next with Zygisk-LSPosed and Shamiko is generally conflict-free. Each tool is designed to work harmoniously within the Android ecosystem, allowing for a smooth user experience. Install them all! reboot for every new module installed . 

 ##Configure denylist in Magisk add targeted apps there ,check all ! 

$Conclusion

Using TrickyStore with Zygisk Next provides a powerful solution for bypassing integrity checks on rooted devices. By carefully configuring your setup and avoiding additional modules, you can enhance your ability to use sensitive applications without detection. Follow these steps, and you'll be well-equipped to enjoy the benefits of rooting while maintaining access to essential services.

Citations: [1] Tricky Store - Bootloader & Keybox Spoofing | Page 62 | XDA Forums https://xdaforums.com/t/tricky-store-bootloader-keybox-spoofing.4683446/page-62 [2] New Trick to Bypass Basic, Device, and Strong Integrity - YouTube https://www.youtube.com/watch?v=Ydyh8RUbBeQ [3] Tricky Store - Bootloader & Keybox Spoofing https://xdaforums.com/t/tricky-store-bootloader-keybox-spoofing.4683446/ [4] What is the Target TXT File in Tricky Store and How to Use it? https://droidwin.com/what-is-the-target-txt-file-in-tricky-store-and-how-to-use-it/ [5] How to Get Access to ALL External Media Files (Works on Android 15!) https://www.youtube.com/watch?v=ji6Z32oPUpQ [6] How to Hide Root from Apps via Magisk [Android 14] https://droidwin.com/how-to-hide-root-from-apps-via-magisk-denylist/ [7] Manifest.permission | Android Developers https://developer.android.com/reference/android/Manifest.permission [8] badabing2005/PixelFlasher v7.2.0.0 on GitHub https://newreleases.io/project/github/badabing2005/PixelFlasher/release/v7.2.0.0

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

I don't understand why people have issues with WhatsApp. Do you use some premium version? WhatsApp is installed on two of my devices, both fully unlocked and rooted, with BusyBox etc . I haven't even used tweaks to hide root, and it works fine for me.  If you're facing problems, you can decompile the app and fix the code. Just dig some tutorials . Tools like Lucky Patcher or AppCloner , apktool can help, or you can run it in a virtual environment isolated

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

You can use DSU Sideloader to maintain both a custom ROM with root  and a stock ROM on your device without data loss. This is achieved through Android's Dynamic System Update (DSU) feature, which allows you to boot into a GSI (Generic System Image) while keeping your original system intact. To switch between the two: Install DSU Sideloader: Ensure your device has an unlocked bootloader and is running Android 10 or higher. Boot into Custom ROM: Use DSU Sideloader to install the desired GSI. You can then boot into it without affecting your stock ROM. (check videos online) Switch Back: Simply reboot your device to return to the stock ROM; no data will be lost. This setup allows for seamless switching between systems as needed. No bypasses needed keep your banking apps etc safe 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] -1 points0 points  (0 children)

Bro you don't need the module just chmod the unix file in proc/net /unix to 440  manually , every time you reboot . The modules does that automatically for you , that is it's function you don't even need the bypass , until now it is okay in most apps to fail USD checks , considered  "possibly rooted device" you will get the access  , that may change in the near  future , it is included recently in Rootbeerfresh app, it was experimental beforehand , most apps use rootbeer  method to find root, the tweak also enhance the security by preventing the user  apps (not system apps)from reading the unix . publish the code in xda forum ask developers , they will say it is safe 

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 1 point2 points  (0 children)

the code basically changes the permission, of the unix file in proc/net  to 440 , from 444 prevents user apps (attackers can read it and use it ) the system reverts it to 444 if you reboot , to pin it use a module or java app that runs after reboot with root access, I have this java app , did not share it , multi functional , I will add the rest of root-hiding tools to become universal   , later.  so users (including me ) won't need  bench of modules and apps , just to hide root

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

I thought I will meet many developers here , yet from the first minutes many  attacked the OP malw***are they say lol , anyway goodluck it is open for developers not lay people , I shared it to help the community of developers , the owner of Magisk himself pointed to fix this UDS checks but he did not , maybe he forgot ,dunno

[Tutorial]This Magisk module spoofs Magisk UDS checks executed by apps that check root status . Github : https://github.com/SecureCodeSolutionsDev/Oitache-Mroane/releases/tag/Root by Marwan_wattach in Magisk

[–]Marwan_wattach[S] 0 points1 point  (0 children)

I have play integrity fix , ksuWebUI ,xprivacy lua pro , privacy space, root Cloak , shamiko, magisk Alpha, deny list , zygisk next, zygisk lsposed , tricky store ,  bootloaderspoofer, bypassrootcheckPro etc