📲Usb Debugging & Developer Mode Detection Bypass Using Regex
Now Follow Video Tutorial : click here 👍
Required codes : 👇
1.) Developer Option Detection Bypass:
2.) Developer Mode Detection Bypass:
3.) Usb Debugging Detection Bypass:
4.) Usb Debugging Option Detection Bypass:
⚠️Share with Proper credit otherwise you f**k
Now Follow Video Tutorial : click here 👍
Required codes : 👇
1.) Developer Option Detection Bypass:
• Search:-(const-string (.*), "development_settings_enabled"\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
• Replace:-$1#$2\nconst/4 $3, 0x0
2.) Developer Mode Detection Bypass:
• Search:-(const-string (.*), "development_settings_enabled"\s*const/4 (.*), 0x0\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
• Replace:-$1#$2\nconst/4 $3, 0x0
3.) Usb Debugging Detection Bypass:
• Search:-(const-string (.*), "adb_enabled"\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
•Replace:-$1#$2\nconst/4 $3, 0x0
4.) Usb Debugging Option Detection Bypass:
•Search:-(const-string (.*), "adb_enabled"\s*const/4 (.*), 0x0\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
•Replace:-$1#$2\nconst/4 $3, 0x0
Notes⚠️:
1. Open the classes.dex file(s) in Dex Editor Plus
2. Click on 3 dot menu and then Preferences
3. Choose Remove all debug info and press OK button
4. After debug info is removed then apply this Regex in classes.dex
Credits:✨
Official Release
Created By @mr_shakir_04👑
👍5
Now Follow Video Tutorial : click here 👍
Required codes : 👇
⚠️Share with Proper credit otherwise you f**k
Required codes : 👇
1.) (Only Some VPN Bypass), Root, binary, debugging, emulator, etc. etc. detection bypass:
•Search:-(\.method.*(isemulator|VerifyVPN|checkvpn|searchPathForBinary|isSuBinaryPresent|findSuBinary|debuggable|findSuperuserApk|isAppDebug|isAppRoot|isDeviceRooted|isrooted|getRootApp|IsADBDebuggingEnabled|IsRoSecureRoKernelQemu|CheckForDangerousAPK|CheckForSuperUserAPK|isVPNConnected|findBinary|hasSU|hasSuperAppByPackageNameInstalled|hasSuperuserAPK|isEmulatorDevice|checkRootFiles|checkForRoot|checkRootPackages|isPackageInstalled|checkForDangerousProps|checkForBusyBoxBinary|checkForBinary|checkForRootNative|checkForMagiskBinary|detectPotentiallyDangerousApps|checkSuExists|checkForSuBinary|detectRootCloakingApps|detectRootManagementApps|isAnyPackageFromListInstalled|isRootedWithoutBusyBoxCheck|detectTestKeys|isTestBuild|hasChainfiresupersu|checkIsRooted|checkSuExists$.*|nativeCheckRoot|hasDeviceRooted|checkSUExist|checkVpnEnabled|isEmulatorDevice|isVpnConnectionAvailable|isUsingVPN|isUSBDebuggingEnabled|isDeveloperModeEnabled|isDeveloperOptionEnabled|isRooted.*|isVirtualDevice|detectRoot.*|isNeedToCheckSuAndBusyBox|isDeviceRooted$.*|_IsEmulator|checkRootMethod.*)\(.*\)[IZ]\n .registers \d+)[\s\S]*?\.end method
•Replace:-$1\nconst/4 v0, 0x0\nreturn v0\n.end method
Credits:✨
Official Release
Created By @mr_shakir_04👑
❤3👍1
Now Follow Video Tutorial : click here 👍
Required codes : 👇
⚠️Share with Proper credit otherwise you f**k
Required codes : 👇
2.) Su, Root, Xposed, Packages, etc. etc. Detection Bypass:
•Search:-const-string (.*), \"(com.koushikdutta.rommanager.license|com.ramdroid.appquarantinepro|com.noshufou.android.su.elite|com.zhiqupk.root.global|com.alephzain.framaroot|com.noshufou.android.su|com.noshufou.android.su.elite|eu.chainfire.supersu|com.thirdparty.superuser|com.koushikdutta.superuser|com.kingo.root|com.yellowes.su|com.topjohnwu.magisk|com.kingroot.kinguser|com.smedialink.oneclickroot|com.charles.lpoqasert|catch_.me_.if_.you_.can_|com.koushikdutta.rommanager|com.dimonvideo.luckypatcher|com.koushikdutta.rommanager.license|com.chelpus.lackypatch|com.ramdroid.appquarantine|supersu|com.ramdroid.appquarantinepro|com.android.vending.billing.InAppBillingService.COIN|com.android.vending.billing.InAppBillingService.LUCK|com.chelpus.luckypatcher|com.blackmartalpha|org.blackmart.market|com.allinone.free|com.repodroid.app|org.creeplays.hack|com.baseappfull.fwd|com.zmapp|com.dv.marketmod.installer|org.mobilism.android|com.android.wp.net.log|com.android.camera.update|cc.madkite.freedom|com.solohsu.android.edxp.manager|org.meowcat.edxposed.manager|com.xmodgame|com.cih.game_cih|/su/bin/|/system/usr/we-need-root/|/system/bin/failsafe/su|/data/local/su|/su/bin/su|/system/sd/xbin/su|/data/local/bin/su|/sbin/su|/data/local/xbin/su|magisk|/system/bin/su|/system/xbin/su|/system/app/Superuser.apk|/system/app/SuperSU.apk|/su/bin/su|com.guoshi.httpcanary|app.greyshirts.sslcapture|com.guoshi.httpcanary.premium|com.minhui.networkcapture|com.minhui.networkcapture.pro|com.egorovandreyrm.pcapremote|com.packagesniffer.frtparlak|jp.co.taosoftware.android.packetcapture|com.emanuelef.remote_capture|com.minhui.wifianalyzer|com.evbadroid.proxymon|com.evbadroid.wicapdemo|com.evbadroid.wicap|com.luckypatchers.luckypatcherinstaller|ru.UbLBBRLf.jSziIaUjL|me.weishu.kernelsu|com.topjohnwu.magisk|com.ramdroid.appquarantine|com.zachspong.temprootremovejb|com.koushikdutta.superuser|com.noshufou.android.su|eu.chainfire.supersu|/su/bin/su|com.minhui.networkcapture.pro|com.guoshi.httpcanary.premium|/data/local/tmp/frida-server|/data/local/tmp/frida-server|de.robv.android.xposed.installer|/su/bin/su|.thirdparty.superuser|.koushikdutta.superuser|.ramdroid.appquarantine|devadvance.rootcloak|.robv.android.xposed.installer|.saurik.substrate|.devadvance.rootcloakplus|.zachspong.temprootremovejb|.amphoras.hidemyroot|.formyhm.hideroot|.chelpus.lackypatch|.dimonvideo.luckypatcher|.koushikdutta.rommanager|.devadvance.rootcloakplus|/system/app/Superuser.apk|/system/xbin/which|com.phoneinfo.changerpro|com.VTechno.androididchanger|com.vivek.imeichanger|com.device.emulator|com.phoneinfo.changer|com.formyhm.hideroot|com.formyhm.hiderootPremium|com.amphoras.hidemyrootadfree|com.amphoras.hidemyroot|com.zachspong.temprootremovejb|com.saurik.substrate|com.devadvance.rootcloak|com.devadvance.rootcloakplus|com.chelpus.luckypatcher|com.ramdroid.appquarantine|com.ramdroid.appquarantinepro|com.joeykrim.rootcheck|/magisk/.core/bin/su|/system/xbin/busybox|/system/etc/init.d/99SuperSUDaemon|/dev/com.koushikdutta.superuser.daemon|/system/xbin/daemonsu|net.csu333.surrogate|fi.razerman.bancontactrootbypasser|me.phh.superuser|com.kingouser.com|/system/sd/xbin/|/system/bin/failsafe/|/sbin/|busybox|/system/app/Superuser|/system/app/SuperSU|SU|su|\/.*su)"
•Replace:-const-string $1, "fucked_by_modderking"
Official Release
Created By @mr_shakir_04👑
👍4🥰3
NP管理器_3.1.11.apk
37.7 MB
2024-09-06 Version v3.1.11:
1. Fix a bug where the Save As feature did not exit when Overwrite was canceled;
2. Fix an axml processing exception from the last version.
1. Fix a bug where the Save As feature did not exit when Overwrite was canceled;
2. Fix an axml processing exception from the last version.
❤1