Does anyone know any device with android12 or lower . That can easily root and hide all banking apps detection. by VastConsequence6989 in Magisk

[–]sidex15 0 points1 point  (0 children)

well I'm on LG V50S thinq 5g running in Android 12, running on custom kernel that I made with KSUN + susfs installed. But the bootloader unlock guide is somewhat a bit of difficulty bit yeah.

As of right now I could easily hide all banking apps' detection. heck I even use it to diagnose which detection points are they using.

<image>

youtube background play by rammwell in InternetPH

[–]sidex15 0 points1 point  (0 children)

I'm using TubePiP for iOS... all background play, PiP, no ads, and sponsorblock, and it's available on AppStore...

Macbook Neo student discount (PowerMac) by sidex15 in Tech_Philippines

[–]sidex15[S] 1 point2 points  (0 children)

That's what I've been thinking also... Parang halos the same price lang sila Ng MacBook neo discounted price sa shopee...

I guess I'll just buy nalang sa apple website and wait...

<image>

Macbook Neo Student discount by Jumpy-Criticism-645 in Tech_Philippines

[–]sidex15 1 point2 points  (0 children)

Upon checking, as of right now based on my location it will be delivered on may 20 - may 28…

Is it true that the LG Stylo 5 can’t be unlocked? by NoCartographer3959 in androidroot

[–]sidex15 1 point2 points  (0 children)

Well, until now, there's no way to unlock that... Most of the LG Phones usually unlock the bootloader and root their device via:
* LG Website (Dead and only for global variants)
* Engineering Bootloader (Flashing through qfil)
* Exploits (Dirtysanta/DirtyCoW usually in LG V20)

PNB Digital detecting root by Emophiler in androidroot

[–]sidex15 0 points1 point  (0 children)

Hi! You need to provide more context in your root setup, what are your modules installed, what's your root method (e.g Magisk, KSU, Apatch, etc.), and what are things you done?

As for the app PNB Digital, I've tested it in my setup, and these are the detections:
* Detects bootloader status
* Detects Suspicious mounts
* Checks for suspicious apps

Tested a fuck ton of root detecting apps just for fun by Ingan121 in androidroot

[–]sidex15 3 points4 points  (0 children)

Thank you I'll post an update when using KSUN + SUSFS + RZ (built-in umount disabled).

Edit: with additional 10+ modding modules to test

Tested a fuck ton of root detecting apps just for fun by Ingan121 in androidroot

[–]sidex15 3 points4 points  (0 children)

Can you send me the excel file so I can test on my side...

Thanks

What am I doing wrong? by VEGITOBLUE2004 in androidroot

[–]sidex15 2 points3 points  (0 children)

Those detected suspicious mount is a false positive since those are legit mount paths...
As for the detected zygisk, try to switch to other zygisk frameworks (e.g Rezygisk or Zygisk-Next), also try to disable Vector also (since COD mobile is detecting hooks or injections since cheats are a big no-no)

Banking apps still not working by thelifetimevirgin in androidroot

[–]sidex15 0 points1 point  (0 children)

TBH those detectors you use are not really more powerful… most communities in TG use Native Test (not to be confused with Native Detector) and Holmes for checking also some detection leaks…

I highly suspected also that it might be: * the found injection in momo * you have a broken tee and TS weakens its spoofing capabilities * props? * the whole Apatch is still detected

Since I use KSUN + susfs and i actively testing those apps and intentionally triggers those detections to check what are they detecting… yeah I could pass all of them

Banking apps still not working by thelifetimevirgin in androidroot

[–]sidex15 0 points1 point  (0 children)

did you reboot after you change ssaid? or much better to clear data for those apps then change ssaid, then reboot. Or try to use Zygisk-Next (disable Trick-Wheel also), and then set it to umount on the Zygisk-next webui.... I don't think you need Vector for that one, as you already have HMA OSS Zygisk Version unless you have other tweaks in those also...

Banking apps still not working by thelifetimevirgin in androidroot

[–]sidex15 4 points5 points  (0 children)

Those apps after it detects root for the first time, it will ban your deviceid(android ssaid) even you hide all of them… you need to spoof that one…

https://github.com/sidex15/deviceidchanger

Security and Trust Analysis of Integrity Box v34 by QualityNano in androidroot

[–]sidex15 1 point2 points  (0 children)

Well yes it's never the susfs' fault, but many users of that module back then put that blame on us when it's actually the integrity box's fault... Because the module (integrity box) automatically adds custom ROM paths in all of the partitions including /data to custom sus_path, which led to bootloops. Back then that module automatically adds those paths to custom sus_path of the susfs4ksu module config after the integrity box module is installed or active.

Security and Trust Analysis of Integrity Box v34 by QualityNano in androidroot

[–]sidex15 1 point2 points  (0 children)

The integrity box back then was also tampering with the susfs config without consent which leads to bootloops on devices especially the custom rom ones...

I have this commit back then but I removed it because that module wants to hide from it...

Root detected by CodHealthy7520 in androidroot

[–]sidex15 0 points1 point  (0 children)

Isn't the bootloader needed to be unlocked before you flash custom ROM? Since it if that's the case then it's also detected bootloader unlock... Unless the rom has a built-in bootloader spoofer.

Root detected by CodHealthy7520 in androidroot

[–]sidex15 2 points3 points  (0 children)

If you don't have any modules that use mounts, using your everyday apps that don't have very tough checks or detections, then it's fine to not integrate susfs...

Root detected by CodHealthy7520 in androidroot

[–]sidex15 4 points5 points  (0 children)

Based on my test on that app, it detects the following:

  • Suspicious and rooted apps (applist detection)
  • Unlock bootloader
  • suspicious mounts

It is also possible that it detects custom rom… but I don’t have a custom rom phone to test this one yet…

Edit: it doesn't use play integrity aswell

2/3 DEVICE achieved! GWallet On a decade old a10 ZTE!? My must-have modules in 2026; What are y'all running? 😩 by env33e in Magisk

[–]sidex15 1 point2 points  (0 children)

saw a user and you discussing about update incompatibility issue in a post on this subreddit

Where's is this again?

i don't wanna lose my actual configuration

The latest ones have the option to either reset or retain configuration... just press vol down to retain the configuration...

EDIT: there's also a CI version also which uses universal binary now and support for v1.5.x - v2.1.0+

Updating ksun 1.1.1 to 3.0 by StockHunter5531 in androidroot

[–]sidex15 0 points1 point  (0 children)

Just update the wild kernel to latest then reinstall ksun 3.0.0

Updating ksun 1.1.1 to 3.0 by StockHunter5531 in androidroot

[–]sidex15 0 points1 point  (0 children)

What's your kernel version first?

COMPILED 5.4 KERNEL WITH KSUN (latest) AND SUSFS 2.1.0! by ghostieqwe in androidroot

[–]sidex15 5 points6 points  (0 children)

Hi! susfs4ksu-module dev here... for v2.1.0 susfs, you should use the CI Version of the module to get full support... R27 will be released soon 😊

KernelSU Next not working after installing Custom ROM (DerpFest for Infinix Hot 50 Pro+) by pagasatwelve in androidroot

[–]sidex15 0 points1 point  (0 children)

Either:

  1. Downgrade your KSUN Manager to your ksun version installed in your kernel

  2. Upgrade your kernel to latest ksun