This media is not supported in your browser
VIEW IN TELEGRAM
A Glimpse Into DexProtector
by Romain Thomas
https://www.romainthomas.fr/post/26-01-dexprotector
https://github.com/romainthomas/dexprotector
by Romain Thomas
https://www.romainthomas.fr/post/26-01-dexprotector
https://github.com/romainthomas/dexprotector
Romain Thomas
A Glimpse Into DexProtector | Romain Thomas
This blog post provides a high-level overview of DexProtector's security features and their limitations
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
if you're only booted with an LKM patched img cooked with the WKSU app, your susfs is not fully implemented, and therefore missing valuable hide methods. Complete susfsV2 implementation is provided by fatalcoder and morganWeedman's tireless labor. Thank you, devs.
While you're booted with root:
- Install latest WKSU CI Build apk
- Install Kernel Flasher fork apk
- Use KF to flash your current ROM's stock partition (the one that you used to patch with WKSU) - DONT REBOOT (else fastboot your half-patched img again)
- Immediately flash your device's latest Wild AK3 CI build
- NOW Reboot.
- Re/install mountify or meta-hybrid module, reboot. [meta modules won't allow further module installs until rebooted and it's best to settle this groundwork first anyways.]
- Configure mount manager, reboot. YMMV what settings will work for your setup.
โ Mountify, set KSU as umounter
- Re/Install sidex15 susfs module or BRENE module, reboot.
- Configure susfs manager settings. some changes may require reboot. Recommend at least:
- Enable VOLD app isolation
- Enable Hide KSU Loop
- Install ReZygisk or ZGNext module , reboot.
- Install
- ReLSPosed or JingMatrixLSP or LSPIT/internal (caveat emptor, dubious origins)
- PIFinject or PIFfork module
- Treat Wheel (only for Rezygisk),
- reboot.
- Configure PIF
โ Spoof Build+Store should be enough unless you're running rom signed with test key
โ Set Auto security patch
โ Fetch (for inject, GH option is more reliable)
- Install TrickyStore + Addon
- install Key Attestation Demo fork
- open KAD and tap the Root of Trust section, it'll copy your boot hash to clipboard.
- Configure TS :
- Paste your boot hash in the menu option
- Grab valid keybox
- Set security patch to some recent release date for whatever your fingerprint has (alt, PIFinject's auto setting should align with TStore's auto setting.)
- Select
โ snitch apps: gms/gsf/vending/w@llet/g.pay
โ Detector apps
โ other sketchy/whiny apps like:
โ bank/finance
โ Zuck/Bezos/Gates/Jobs monopoly properties
โ any other big tech: NFLX,ZOOM, etc
- Install HMA-OSS apk, enable LSP hook for sys framework. (if it says 'on denylist' then disable umount for that app in WKSU superuser config)
- Install FuseFixer apk, enable LSP hook for media picker
- reboot.
- Config HMA-OSS. Probably the same list you hit with TrickyStore, smash all of those with the inbuilt app+settings presets via bulk configurator.
TL;DR : Live without root, or stop worrying so much about detector maxxing. If your apps are working just be cool.
While you're booted with root:
- Install latest WKSU CI Build apk
- Install Kernel Flasher fork apk
- Use KF to flash your current ROM's stock partition (the one that you used to patch with WKSU) - DONT REBOOT (else fastboot your half-patched img again)
- Immediately flash your device's latest Wild AK3 CI build
- NOW Reboot.
- Re/install mountify or meta-hybrid module, reboot. [meta modules won't allow further module installs until rebooted and it's best to settle this groundwork first anyways.]
- Configure mount manager, reboot. YMMV what settings will work for your setup.
โ Mountify, set KSU as umounter
- Re/Install sidex15 susfs module or BRENE module, reboot.
- Configure susfs manager settings. some changes may require reboot. Recommend at least:
- Enable VOLD app isolation
- Enable Hide KSU Loop
- Install ReZygisk or ZGNext module , reboot.
- Install
- ReLSPosed or JingMatrixLSP or LSPIT/internal (caveat emptor, dubious origins)
- PIFinject or PIFfork module
- Treat Wheel (only for Rezygisk),
- reboot.
- Configure PIF
โ Spoof Build+Store should be enough unless you're running rom signed with test key
โ Set Auto security patch
โ Fetch (for inject, GH option is more reliable)
- Install TrickyStore + Addon
- install Key Attestation Demo fork
- open KAD and tap the Root of Trust section, it'll copy your boot hash to clipboard.
- Configure TS :
- Paste your boot hash in the menu option
- Grab valid keybox
- Set security patch to some recent release date for whatever your fingerprint has (alt, PIFinject's auto setting should align with TStore's auto setting.)
- Select
โ snitch apps: gms/gsf/vending/w@llet/g.pay
โ Detector apps
โ other sketchy/whiny apps like:
โ bank/finance
โ Zuck/Bezos/Gates/Jobs monopoly properties
โ any other big tech: NFLX,ZOOM, etc
- Install HMA-OSS apk, enable LSP hook for sys framework. (if it says 'on denylist' then disable umount for that app in WKSU superuser config)
- Install FuseFixer apk, enable LSP hook for media picker
- reboot.
- Config HMA-OSS. Probably the same list you hit with TrickyStore, smash all of those with the inbuilt app+settings presets via bulk configurator.
TL;DR : Live without root, or stop worrying so much about detector maxxing. If your apps are working just be cool.
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Tech Tracker
https://techtrackerx.com/2023/05/15/how-to-run-x86_64-windows-apps-on-android-via-winlator-emulator/
Tech Tracker
How to run x86_64 Windows apps on Android via Winlator Emulator.
East or west "Windows" is one of the best if not the best operating system for PCs and laptops etc developed by Microsoft inc. back in year 1985 founded by William Henry Bill Gates ||| and Paul...
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Tech Tracker
Tech Tracker
mcpro24fps โ pro raw video camera app for Android smartphones.
Black / White - B/W to color photographs - photos and eventually to moving B/W and colour pictures also known as films, the transition of camera and it's technologies over past few centuries is...
Forwarded from KernelSU Next
So i just fixed a very bad crash issue for KPatch-Next with its minimal rehook when enabled it does a very bad kernel panic or syscalls being broken on the entire system, but it gets back in track after a reboot but yes it will happen again if minimal rehook is toggled again, idk why but this thing came to occur when i removed the need of a superkey, weird.
Well anyways after 5 hours of debugging, testing and several refactors i found out it was a massive buffer overflow memory shitting the device up.
Welp anyways its fixed and im dead.
So i suggest if you want to update for next CI please use a fresh boot/kernel non Kpnext patched to repatch.
Well anyways after 5 hours of debugging, testing and several refactors i found out it was a massive buffer overflow memory shitting the device up.
Welp anyways its fixed and im dead.
So i suggest if you want to update for next CI please use a fresh boot/kernel non Kpnext patched to repatch.
Forwarded from KernelSU Next
KPatch-Next-Module-110.zip
1016.4 KB
Forwarded from KernelSU Next
Good thing you can't use hacks like this with kpnext cuz we are now keyless, at least for now old hacks won't work or new future hacks
Be fair and respectful to others and don't use cheats, you are lucky I didn't expose you
Be fair and respectful to others and don't use cheats, you are lucky I didn't expose you
This media is not supported in your browser
VIEW IN TELEGRAM