MODDING TOOLS
717 subscribers
1 photo
306 files
31 links
• Here you can find
• Modded apps
• Modding tools
• Useful tools for developers
• Simple tools for android
• Tutorials on modding tools @moddingtutorialnew
Download Telegram
📲Usb Debugging & Developer Mode Detection Bypass Using Regex

Now Follow Video Tutorial : click here 👍

Required codes : 👇

1.) Developer Option Detection Bypass:

• Search:- (const-string (.*), "development_settings_enabled"\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))

• Replace:- $1#$2\nconst/4 $3, 0x0


2.) Developer Mode Detection Bypass:

• Search:- (const-string (.*), "development_settings_enabled"\s*const/4 (.*), 0x0\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))

• Replace:- $1#$2\nconst/4 $3, 0x0

3.) Usb Debugging Detection Bypass:

• Search:- (const-string (.*), "adb_enabled"\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))

•Replace:- $1#$2\nconst/4 $3, 0x0


4.) Usb Debugging Option Detection Bypass:

•Search:- (const-string (.*), "adb_enabled"\s*const/4 (.*), 0x0\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))

•Replace:- $1#$2\nconst/4 $3, 0x0


Notes⚠️:
1. Open the classes.dex file(s) in Dex Editor Plus

2. Click on 3 dot menu and then Preferences

3. Choose Remove all debug info and press OK button

4. After debug info is removed then apply this Regex in classes.dex
Credits:
Official Release
Created By @mr_shakir_04👑

⚠️Share with Proper credit otherwise you f**k
👍5
Now Follow Video Tutorial : click here 👍

Required codes : 👇

1.) (Only Some VPN Bypass), Root, binary, debugging, emulator, etc. etc. detection bypass:


•Search:-  (\.method.*(isemulator|VerifyVPN|checkvpn|searchPathForBinary|isSuBinaryPresent|findSuBinary|debuggable|findSuperuserApk|isAppDebug|isAppRoot|isDeviceRooted|isrooted|getRootApp|IsADBDebuggingEnabled|IsRoSecureRoKernelQemu|CheckForDangerousAPK|CheckForSuperUserAPK|isVPNConnected|findBinary|hasSU|hasSuperAppByPackageNameInstalled|hasSuperuserAPK|isEmulatorDevice|checkRootFiles|checkForRoot|checkRootPackages|isPackageInstalled|checkForDangerousProps|checkForBusyBoxBinary|checkForBinary|checkForRootNative|checkForMagiskBinary|detectPotentiallyDangerousApps|checkSuExists|checkForSuBinary|detectRootCloakingApps|detectRootManagementApps|isAnyPackageFromListInstalled|isRootedWithoutBusyBoxCheck|detectTestKeys|isTestBuild|hasChainfiresupersu|checkIsRooted|checkSuExists$.*|nativeCheckRoot|hasDeviceRooted|checkSUExist|checkVpnEnabled|isEmulatorDevice|isVpnConnectionAvailable|isUsingVPN|isUSBDebuggingEnabled|isDeveloperModeEnabled|isDeveloperOptionEnabled|isRooted.*|isVirtualDevice|detectRoot.*|isNeedToCheckSuAndBusyBox|isDeviceRooted$.*|_IsEmulator|checkRootMethod.*)\(.*\)[IZ]\n .registers \d+)[\s\S]*?\.end method

•Replace:-  $1\nconst/4 v0, 0x0\nreturn v0\n.end method

Credits:
Official Release
Created By @mr_shakir_04👑
⚠️Share with Proper credit otherwise you f**k
3👍1
Now Follow Video Tutorial : click here 👍

Required codes : 👇

2.) Su, Root, Xposed, Packages, etc. etc. Detection Bypass:


•Search:- const-string (.*), \"(com.koushikdutta.rommanager.license|com.ramdroid.appquarantinepro|com.noshufou.android.su.elite|com.zhiqupk.root.global|com.alephzain.framaroot|com.noshufou.android.su|com.noshufou.android.su.elite|eu.chainfire.supersu|com.thirdparty.superuser|com.koushikdutta.superuser|com.kingo.root|com.yellowes.su|com.topjohnwu.magisk|com.kingroot.kinguser|com.smedialink.oneclickroot|com.charles.lpoqasert|catch_.me_.if_.you_.can_|com.koushikdutta.rommanager|com.dimonvideo.luckypatcher|com.koushikdutta.rommanager.license|com.chelpus.lackypatch|com.ramdroid.appquarantine|supersu|com.ramdroid.appquarantinepro|com.android.vending.billing.InAppBillingService.COIN|com.android.vending.billing.InAppBillingService.LUCK|com.chelpus.luckypatcher|com.blackmartalpha|org.blackmart.market|com.allinone.free|com.repodroid.app|org.creeplays.hack|com.baseappfull.fwd|com.zmapp|com.dv.marketmod.installer|org.mobilism.android|com.android.wp.net.log|com.android.camera.update|cc.madkite.freedom|com.solohsu.android.edxp.manager|org.meowcat.edxposed.manager|com.xmodgame|com.cih.game_cih|/su/bin/|/system/usr/we-need-root/|/system/bin/failsafe/su|/data/local/su|/su/bin/su|/system/sd/xbin/su|/data/local/bin/su|/sbin/su|/data/local/xbin/su|magisk|/system/bin/su|/system/xbin/su|/system/app/Superuser.apk|/system/app/SuperSU.apk|/su/bin/su|com.guoshi.httpcanary|app.greyshirts.sslcapture|com.guoshi.httpcanary.premium|com.minhui.networkcapture|com.minhui.networkcapture.pro|com.egorovandreyrm.pcapremote|com.packagesniffer.frtparlak|jp.co.taosoftware.android.packetcapture|com.emanuelef.remote_capture|com.minhui.wifianalyzer|com.evbadroid.proxymon|com.evbadroid.wicapdemo|com.evbadroid.wicap|com.luckypatchers.luckypatcherinstaller|ru.UbLBBRLf.jSziIaUjL|me.weishu.kernelsu|com.topjohnwu.magisk|com.ramdroid.appquarantine|com.zachspong.temprootremovejb|com.koushikdutta.superuser|com.noshufou.android.su|eu.chainfire.supersu|/su/bin/su|com.minhui.networkcapture.pro|com.guoshi.httpcanary.premium|/data/local/tmp/frida-server|/data/local/tmp/frida-server|de.robv.android.xposed.installer|/su/bin/su|.thirdparty.superuser|.koushikdutta.superuser|.ramdroid.appquarantine|devadvance.rootcloak|.robv.android.xposed.installer|.saurik.substrate|.devadvance.rootcloakplus|.zachspong.temprootremovejb|.amphoras.hidemyroot|.formyhm.hideroot|.chelpus.lackypatch|.dimonvideo.luckypatcher|.koushikdutta.rommanager|.devadvance.rootcloakplus|/system/app/Superuser.apk|/system/xbin/which|com.phoneinfo.changerpro|com.VTechno.androididchanger|com.vivek.imeichanger|com.device.emulator|com.phoneinfo.changer|com.formyhm.hideroot|com.formyhm.hiderootPremium|com.amphoras.hidemyrootadfree|com.amphoras.hidemyroot|com.zachspong.temprootremovejb|com.saurik.substrate|com.devadvance.rootcloak|com.devadvance.rootcloakplus|com.chelpus.luckypatcher|com.ramdroid.appquarantine|com.ramdroid.appquarantinepro|com.joeykrim.rootcheck|/magisk/.core/bin/su|/system/xbin/busybox|/system/etc/init.d/99SuperSUDaemon|/dev/com.koushikdutta.superuser.daemon|/system/xbin/daemonsu|net.csu333.surrogate|fi.razerman.bancontactrootbypasser|me.phh.superuser|com.kingouser.com|/system/sd/xbin/|/system/bin/failsafe/|/sbin/|busybox|/system/app/Superuser|/system/app/SuperSU|SU|su|\/.*su)"

•Replace:- const-string $1, "fucked_by_modderking"

Official Release 
Created By @mr_shakir_04👑

⚠️Share with Proper credit otherwise you f**k
👍4🥰3
NP管理器_3.1.11.apk
37.7 MB
2024-09-06 Version v3.1.11:
1. Fix a bug where the Save As feature did not exit when Overwrite was canceled;
2. Fix an axml processing exception from the last version.
1