📲Usb Debugging & Developer Mode Detection Bypass Using Regex
Now Follow Video Tutorial : click here 👍
Required codes : 👇
1.) Developer Option Detection Bypass:
2.) Developer Mode Detection Bypass:
3.) Usb Debugging Detection Bypass:
4.) Usb Debugging Option Detection Bypass:
⚠️Share with Proper credit otherwise you f**k
Now Follow Video Tutorial : click here 👍
Required codes : 👇
1.) Developer Option Detection Bypass:
• Search:-(const-string (.*), "development_settings_enabled"\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
• Replace:-$1#$2\nconst/4 $3, 0x0
2.) Developer Mode Detection Bypass:
• Search:-(const-string (.*), "development_settings_enabled"\s*const/4 (.*), 0x0\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
• Replace:-$1#$2\nconst/4 $3, 0x0
3.) Usb Debugging Detection Bypass:
• Search:-(const-string (.*), "adb_enabled"\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
•Replace:-$1#$2\nconst/4 $3, 0x0
4.) Usb Debugging Option Detection Bypass:
•Search:-(const-string (.*), "adb_enabled"\s*const/4 (.*), 0x0\s*invoke-static \{(.*), (.*), (.*)\}, .*;->getInt\(.*Ljava\/lang\/String;I\)I\s*)(move-result (.*))
•Replace:-$1#$2\nconst/4 $3, 0x0
Notes⚠️:
1. Open the classes.dex file(s) in Dex Editor Plus
2. Click on 3 dot menu and then Preferences
3. Choose Remove all debug info and press OK button
4. After debug info is removed then apply this Regex in classes.dex
Credits:✨
Official Release
Created By @mr_shakir_04👑
👍5
Now Follow Video Tutorial : click here 👍
Required codes : 👇
⚠️Share with Proper credit otherwise you f**k
Required codes : 👇
1.) (Only Some VPN Bypass), Root, binary, debugging, emulator, etc. etc. detection bypass:
•Search:-(\.method.*(isemulator|VerifyVPN|checkvpn|searchPathForBinary|isSuBinaryPresent|findSuBinary|debuggable|findSuperuserApk|isAppDebug|isAppRoot|isDeviceRooted|isrooted|getRootApp|IsADBDebuggingEnabled|IsRoSecureRoKernelQemu|CheckForDangerousAPK|CheckForSuperUserAPK|isVPNConnected|findBinary|hasSU|hasSuperAppByPackageNameInstalled|hasSuperuserAPK|isEmulatorDevice|checkRootFiles|checkForRoot|checkRootPackages|isPackageInstalled|checkForDangerousProps|checkForBusyBoxBinary|checkForBinary|checkForRootNative|checkForMagiskBinary|detectPotentiallyDangerousApps|checkSuExists|checkForSuBinary|detectRootCloakingApps|detectRootManagementApps|isAnyPackageFromListInstalled|isRootedWithoutBusyBoxCheck|detectTestKeys|isTestBuild|hasChainfiresupersu|checkIsRooted|checkSuExists$.*|nativeCheckRoot|hasDeviceRooted|checkSUExist|checkVpnEnabled|isEmulatorDevice|isVpnConnectionAvailable|isUsingVPN|isUSBDebuggingEnabled|isDeveloperModeEnabled|isDeveloperOptionEnabled|isRooted.*|isVirtualDevice|detectRoot.*|isNeedToCheckSuAndBusyBox|isDeviceRooted$.*|_IsEmulator|checkRootMethod.*)\(.*\)[IZ]\n .registers \d+)[\s\S]*?\.end method
•Replace:-$1\nconst/4 v0, 0x0\nreturn v0\n.end method
Credits:✨
Official Release
Created By @mr_shakir_04👑
❤3👍1
Now Follow Video Tutorial : click here 👍
Required codes : 👇
⚠️Share with Proper credit otherwise you f**k
Required codes : 👇
2.) Su, Root, Xposed, Packages, etc. etc. Detection Bypass:
•Search:-const-string (.*), \"(com.koushikdutta.rommanager.license|com.ramdroid.appquarantinepro|com.noshufou.android.su.elite|com.zhiqupk.root.global|com.alephzain.framaroot|com.noshufou.android.su|com.noshufou.android.su.elite|eu.chainfire.supersu|com.thirdparty.superuser|com.koushikdutta.superuser|com.kingo.root|com.yellowes.su|com.topjohnwu.magisk|com.kingroot.kinguser|com.smedialink.oneclickroot|com.charles.lpoqasert|catch_.me_.if_.you_.can_|com.koushikdutta.rommanager|com.dimonvideo.luckypatcher|com.koushikdutta.rommanager.license|com.chelpus.lackypatch|com.ramdroid.appquarantine|supersu|com.ramdroid.appquarantinepro|com.android.vending.billing.InAppBillingService.COIN|com.android.vending.billing.InAppBillingService.LUCK|com.chelpus.luckypatcher|com.blackmartalpha|org.blackmart.market|com.allinone.free|com.repodroid.app|org.creeplays.hack|com.baseappfull.fwd|com.zmapp|com.dv.marketmod.installer|org.mobilism.android|com.android.wp.net.log|com.android.camera.update|cc.madkite.freedom|com.solohsu.android.edxp.manager|org.meowcat.edxposed.manager|com.xmodgame|com.cih.game_cih|/su/bin/|/system/usr/we-need-root/|/system/bin/failsafe/su|/data/local/su|/su/bin/su|/system/sd/xbin/su|/data/local/bin/su|/sbin/su|/data/local/xbin/su|magisk|/system/bin/su|/system/xbin/su|/system/app/Superuser.apk|/system/app/SuperSU.apk|/su/bin/su|com.guoshi.httpcanary|app.greyshirts.sslcapture|com.guoshi.httpcanary.premium|com.minhui.networkcapture|com.minhui.networkcapture.pro|com.egorovandreyrm.pcapremote|com.packagesniffer.frtparlak|jp.co.taosoftware.android.packetcapture|com.emanuelef.remote_capture|com.minhui.wifianalyzer|com.evbadroid.proxymon|com.evbadroid.wicapdemo|com.evbadroid.wicap|com.luckypatchers.luckypatcherinstaller|ru.UbLBBRLf.jSziIaUjL|me.weishu.kernelsu|com.topjohnwu.magisk|com.ramdroid.appquarantine|com.zachspong.temprootremovejb|com.koushikdutta.superuser|com.noshufou.android.su|eu.chainfire.supersu|/su/bin/su|com.minhui.networkcapture.pro|com.guoshi.httpcanary.premium|/data/local/tmp/frida-server|/data/local/tmp/frida-server|de.robv.android.xposed.installer|/su/bin/su|.thirdparty.superuser|.koushikdutta.superuser|.ramdroid.appquarantine|devadvance.rootcloak|.robv.android.xposed.installer|.saurik.substrate|.devadvance.rootcloakplus|.zachspong.temprootremovejb|.amphoras.hidemyroot|.formyhm.hideroot|.chelpus.lackypatch|.dimonvideo.luckypatcher|.koushikdutta.rommanager|.devadvance.rootcloakplus|/system/app/Superuser.apk|/system/xbin/which|com.phoneinfo.changerpro|com.VTechno.androididchanger|com.vivek.imeichanger|com.device.emulator|com.phoneinfo.changer|com.formyhm.hideroot|com.formyhm.hiderootPremium|com.amphoras.hidemyrootadfree|com.amphoras.hidemyroot|com.zachspong.temprootremovejb|com.saurik.substrate|com.devadvance.rootcloak|com.devadvance.rootcloakplus|com.chelpus.luckypatcher|com.ramdroid.appquarantine|com.ramdroid.appquarantinepro|com.joeykrim.rootcheck|/magisk/.core/bin/su|/system/xbin/busybox|/system/etc/init.d/99SuperSUDaemon|/dev/com.koushikdutta.superuser.daemon|/system/xbin/daemonsu|net.csu333.surrogate|fi.razerman.bancontactrootbypasser|me.phh.superuser|com.kingouser.com|/system/sd/xbin/|/system/bin/failsafe/|/sbin/|busybox|/system/app/Superuser|/system/app/SuperSU|SU|su|\/.*su)"
•Replace:-const-string $1, "fucked_by_modderking"
Official Release
Created By @mr_shakir_04👑
👍4🥰3
NP管理器_3.1.11.apk
37.7 MB
2024-09-06 Version v3.1.11:
1. Fix a bug where the Save As feature did not exit when Overwrite was canceled;
2. Fix an axml processing exception from the last version.
1. Fix a bug where the Save As feature did not exit when Overwrite was canceled;
2. Fix an axml processing exception from the last version.
❤1
NP管理器_3.1.13.apk
37.7 MB
2024-10-14 v3.1.13 version:
1. Fix an exception where apks cannot be installed after being converted to apk
2. Optimize the handling of time-consuming tasks such as Dex2C to avoid server connection exceptions midway
1. Fix an exception where apks cannot be installed after being converted to apk
2. Optimize the handling of time-consuming tasks such as Dex2C to avoid server connection exceptions midway
MT Manager_2.14.5-clone-MOD-v6-xml-fix-beta.apk
26.3 MB
MTManager_2.14.5-clone-MOD-v6-xml-fix-beta:
⚡️Features
• No login required
• Update check patched
• Server detection completely removed
• Arsc editor plus
• XML decompilation (Partial Id2Name, Not support pseudo encrypted file)
• Axml auto complete feature
• Hex editor
• Smali to Java (Only for Dex+ , Jadx only, Offline, Not support latest smali instructions)
• Smali method to Java
• Signature killer
• Resources anti-confuse
• Resource querier
• Dex redivision
• Antisplit (Apks2Apk)
• Plugin function
• Signature Importer
• Custom package name in apk cloning
• App cloning with new method
• Axml comparison
• Text comparison
• Dex comparison
• Arsc comparison
• Repair dex file
• FTPS SFTP SMB WebDav network storage
• Unlimited Dictionaries
• Resource query menu (from AXML editor)
• Auto translation (from Editor floating menu, Dex string and Resource string translate)
• Auto completion (Dex Editing)
• Batch dex class deletion
• Batch apk extraction
• Function bar import/export
• Apk extraction preferences
⚡️Features
• No login required
• Update check patched
• Server detection completely removed
• Arsc editor plus
• XML decompilation (Partial Id2Name, Not support pseudo encrypted file)
• Axml auto complete feature
• Hex editor
• Smali to Java (Only for Dex+ , Jadx only, Offline, Not support latest smali instructions)
• Smali method to Java
• Signature killer
• Resources anti-confuse
• Resource querier
• Dex redivision
• Antisplit (Apks2Apk)
• Plugin function
• Signature Importer
• Custom package name in apk cloning
• App cloning with new method
• Axml comparison
• Text comparison
• Dex comparison
• Arsc comparison
• Repair dex file
• FTPS SFTP SMB WebDav network storage
• Unlimited Dictionaries
• Resource query menu (from AXML editor)
• Auto translation (from Editor floating menu, Dex string and Resource string translate)
• Auto completion (Dex Editing)
• Batch dex class deletion
• Batch apk extraction
• Function bar import/export
• Apk extraction preferences