What are our options to pass SafetyNet on an Android Emulator? - Android Q&A, Help & Troubleshooting

Is there any way to pass SafetyNet on an emulator?
I believe there would be Magisk and Universal SafatyNet Fix Module involved, yet what's their states in 2020.
I have got crazy enough to recompile Android Emulator and Android to change hardware info to pass it - I'm hesitant even if that'd work either! -

Un-root emulator.

jwoegerbauer said:
Un-root emulator.
Click to expand...
Click to collapse
I have tested this process on stock android emulator as well,
This problem unfortunately still persists and has roots deep whithin the SafetyNet architecture which by default return false for both basicIntegrity and ctsProfile.
Do we have any tools for spoofing the device hardware info and hide that we're on an emulator?
Does having a custom emulator will help at all? - since we'll not have google play services at all -

hrtcop said:
I have tested this process on stock android emulator as well,
This problem unfortunately still persists and has roots deep whithin the SafetyNet architecture which by default return false for both basicIntegrity and ctsProfile.
Do we have any tools for spoofing the device hardware info and hide that we're on an emulator?
Does having a custom emulator will help at all? - since we'll not have google play services at all -
Click to expand...
Click to collapse
To clarify things:
SafetyNet API ( part of Google Play Services Framework ) doesn't have "roots deep within": it simply queries an Android OS for being tampered in any way, will say SafetyNet API is designed to detect modified devices, may be Android got rooted or it's Custom ROM, what causes SafetyNet check will fail.
If an app doesn't rely on presence of GMS ( GMS is not part of any Android ) then on emulator a SafetyNet check isn't done at all.

Related

Hide root from Banking apps

Please can someone help I am using magisk to hide root and this was working great on lineage os 8.1. Due to a few problems I changed Roms to aosp android 9.0. I have installed magisk and the safetynet check shows it is working fine. However all the banking apps such as Halifax and Barclays are detecting the device is rooted even though they have been selected in Magisk.
Please can someone help with finding a fix for this.
Check if su exist
Hi,
To detect root may your bank app checks if these files exists on the system :
Code:
/system/app/Superuser.apk
/sbin/su
/system/bin/su
/system/xbin/su
/data/local/xbin/su
/data/local/bin/su
/system/sd/xbin/su
/system/bin/failsafe/su
/data/local/su
/su/bin/su
Check by yourself if these files don't exist to be sure that root is really hide...
The files do not exist on my device
ariaz786 said:
Please can someone help I am using magisk to hide root and this was working great on lineage os 8.1. Due to a few problems I changed Roms to aosp android 9.0. I have installed magisk and the safetynet check shows it is working fine. However all the banking apps such as Halifax and Barclays are detecting the device is rooted even though they have been selected in Magisk.
Please can someone help with finding a fix for this.
Click to expand...
Click to collapse
I gave up with this myself, the only way is to use the banks main sites with a good browser.

TrustMeAlready - Disable SSL verification and pinning on Android

An Xposed module to disable SSL verification and pinning on Android using the excellent technique provided by Mattia Vinci.
The effect is system-wide.
Useful for various security audits.
GitHub repository | Xposed repository
Nice module. Could this be done in Magisk?
ViRb3 said:
An Xposed module to disable SSL verification and pinning on Android using the excellent technique provided by Mattia Vinci.
The effect is system-wide.
Useful for various security audits.
GitHub repository | Xposed repository
Click to expand...
Click to collapse
Okay, but why would I want to disable it and what is pinning?
Posted from my way cool LG V20 (H910) Nougat 7.0
joluke said:
Nice module. Could this be done in Magisk?
Click to expand...
Click to collapse
Probably, but that would be very overkill. The EdXposed framework (which can load this module) is based on Magisk and passes SafetyNet, check it out.
Zeuszoos said:
Okay, but why would I want to disable it and what is pinning?
Posted from my way cool LG V20 (H910) Nougat 7.0
Click to expand...
Click to collapse
It comes into play when analyzing encrypted traffic from apps, e.g. malware. First, here's some resources that explain how to analyze traffic: https://en.wikipedia.org/wiki/Man-in-the-middle_attack, https://security.stackexchange.com/...ent-man-in-the-middle-attacks-by-proxy-server
Basically, you would need to proxy traffic to your computer and replace the server certificate with your own one (that you can decrypt). However, Android won't recognize that homemade certificate and reject it. To prevent this, sometimes you can import it in your phone's settings. But then there's certificate pinning, which forces an app to use ONLY the specified certificate and nothing else. So even if you add your hommade certificate to the trusted list, it will still be different and thus rejected. This module gets rid of both problems by making Android accept any certificate without verification. Needless to say, this is extremely insecure, but for our purposes it saves a ton of effort
Thanks you very much for this! I love it, I can see all the ssl data
not working for *.googleapis.com, any idea?
Hello vibr3,
I appreciate your great work on that script. I'm on FOS 6.0 on firetv 4k, I installed the module in xposed but running it wouldn't do anything. It seems like it's not working probably on my SDK25, android 7.1.
I've been using your awesome module (alongside Fiddler/CharlesProxy) for the past couple of weeks, and it's been working perfectly for a couple of apps that I needed to reverse engineer.
However, some apps (e.g. Instagram) won't accept the CA certificate that I use (self signed, user-installed). Is there anything I can do to be able to decrypt traffic for these kind of apps?
I use LineageOS 14.1
DRSDavidSoft said:
I've been using your awesome module (alongside Fiddler/CharlesProxy) for the past couple of weeks, and it's been working perfectly for a couple of apps that I needed to reverse engineer.
However, some apps (e.g. Instagram) won't accept the CA certificate that I use (self signed, user-installed). Is there anything I can do to be able to decrypt traffic for these kind of apps?
I use LineageOS 14.1
Click to expand...
Click to collapse
Same question for YouTube app
Is there any method to bypass certificate verification for nonroot. ?
@ViRb3
Could you advice me please? If i disable certificate pinning using your application but still don't see the requests in the fiddler where can be a problem?
What is it that when I try to use this, it says the app cannot be on the deny list. What if the app is root protected and ssl pinning enabled at the same time?

TaiChi:Using Xposed modules with/without Root/Unlock bootloader on Android 5.0~10.0

Hi, I am the author of VirtualXposed: https://forum.xda-developers.com/xposed/virtualxposed-xposed-root-unlock-t3760313
VirtualXposed can run some Xposed modules on Non-Root devices without needing to unlock the bootloader or flash any sysytem images, but it can not act on system processes.
After a lot of exploration and experiment, I found a better way to run (Xposed) modules. It can run on both root and non-root devices, and it support Android 5.0 ~ 10.0 I release the beta version in China at 2019/1/5, after many tests and improvements, it is stable enough now to introduce it for you.
The app, or framework is named TaiChi
## Introduction
TaiChi is a framework to use Xposed module with or without Root/Unlock bootloader, it support Android 5.0 ~ 9.0.
In simple words, TaiChi is Xposed-Styled Framework, it can load Xposed modules, do hooks and so on.
## Feature
TaiChi is Xposed-Styled, but it has no relation with Xposed. The only relevance is that TaiChi can load Xposed modules, the implementation of TaiChi and Xposed Framework is very different.
Here are some features of Taichi:
1. TaiChi has fully supports for Android Pie.
2. TaiChi can run in non-root mode.
3. TaiChi does not effect the android system and it does not hook all apps in system. Only the apps you want to apply Xposed modules are hooked. Other apps in system run in a completely clean environment, which means TaiChi can pass SafeNet easily.
4. TaiChi doesn't need to reboot system in most cases
5. TaiChi is hard to detect. TaiChi doesn't modify the libart and app_process, it has nearly no noticeable characteristics.
## Usage
TaiChi has two work mode: magisk mode and non-root mode. If you don't want to unlock the bootloader/flash system images, you can use the non-root mode, if you prefer more powerful functions, just try magisk mode.
### What is the different with magisk mode and non-root mode?
The only difference is that magisk mode can hook system process, so more modules are supported, such as Xposed Edge/Greenify.But magisk mode need to unlock the bootloader and install Magisk, while non-root mode just needs to install a simple app.
### Non-Root mode
TaiChi run in non-root mode in genernal, just install a simple app, all the installation is over. If you want to use Xposed modules, for example, you'd like to use SnapFreedom on SnapChat, follow these steps:
1. Click the float button in Home page of TaiChi, and then click the button : **Create App**.
2. Select the app you'd like to apply Xposed modules, such as SnapChat.
3. Click the "Create" button at the bottom and then wait the creation to finish pariently.
4. When creation finished, TaiChi tells you that you need to unstall the original SnapChat, please uninstall it, this is necessary. Because TaiChi in non-root mode needs to modify the APK file which means we have to re-sign the APK.
5. Follow the steps in TaiChi app until you installed the new app.
6. Enter the **Module Manage** activity by click the button "Module Manager" of the float button in Home page.
7. Check the SnapFreedom module.
8. Kill the process of SnapChat and the Xposed modules should work properly.(You don't need to reboot system)
### Magisk mode
Non-root mode of TaiChi has some shortcomming even though it do not need to unlock bootloader, so i develop a magisk module, this module can give TaiChi extra power to overcome these shortcommings:
1. magisk mode can hook into system process.
2. magisk mode don't need to modify the apk, and the signature keeps same.
When you flashed the [magisk module]https://github.com/tiann/TaiChi-Magisk provided by TaiChi, TaiChi app switch to magisk mode automaticly: TaiChi App + magisk module = TaiChi·Magisk. When the magisk module is disabled or removed, TaiChi app turn to non-root mode.
If you want to use magisk mode, please read the [wiki](https://github.com/tiann/Tai-Chi/wiki/taichi-magisk-beta) carefully.
## For Developers
TaiChi is a Framework, developers can wrote modules to do hooks. The TaiChi modules is fully compatible to Xposed modules, so just wrote the Xposed-Styled modules and it can run well in TaiChi, too.
But there are still some difference from TaiChi Framework and Xposed Framework, please refer [For Xposed Developers]https://github.com/tiann/Tai-Chi/wiki/For-Xposed-developer
## Discuss
- [Telegram Group](https://t.me/vxp_group)
## Contact me
(mailto:[email protected])
[B]## Other [/B]
1. TaiChi is closed-source now, it may be open-sourced in the future, but not now.
2. TaiChi can not run Xposed modules arbitrarily(it supports it in technical-speaking), it can only run specific version and specific modules now. If you want to use other modules, please fire an issue. Here is the support list: https://taichi.cool/module/module.html
3. TaiChi is compatible to Xposed modules, but it may have its own module in the future.
[B][U][SIZE="4"][PLAIN]XDAevDB Information[/PLAIN][/SIZE][/U][/B]
[SIZE=3][B]TaiChi, Xposed for all devices (see above for details)[/B][/SIZE]
[B][U]Contributors[/U][/B]
[URL="https://forum.xda-developers.com/member.php?u=8994560"]weishu[/URL], [URL="https://forum.xda-developers.com/member.php?u=8994560"]weishu[/URL]
[B]Source Code:[/B] [URL="https://github.com/taichi-framework"]https://github.com/taichi-framework[/URL]
[B]Xposed Package Name:[/B]
[B][U]Version Information[/U][/B]
[B]Status:[/B] Stable
[B]Created[/B] 2019-03-11
[B]Last Updated[/B] 2019-03-16
I noticed the magisk module today on the repo. Sounds very promising and... tempting to me.
But, regardless of how much I'd love to finally have xposed modules on pie, there's one major deal-breaker here: Closed source.
TaiChi magisk (as well as xposed) are extremely mighty - which makes it mandatory for us to see and confirm what's happening behind the curtains.
As soon as it gets open source, I'll be back and support this project.
Sent from my OnePlus 6 using XDA Labs
weishu said:
TaiChi run in non-root mode in genernal, just install a simple app, all the installation is over. If you want to use Xposed modules, for example, you'd like to use SnapFreedom on SnapChat, follow these steps:
1. Click the float button in Home page of TaiChi, and then click the button : **Create App**.
2. Select the app you'd like to apply Xposed modules, such as SnapChat.
3. Click the "Create" button at the bottom and then wait the creation to finish pariently.
4. When creation finished, TaiChi tells you that you need to unstall the original SnapChat, please uninstall it, this is necessary. Because TaiChi in non-root mode needs to modify the APK file which means we have to re-sign the APK.
5. Follow the steps in TaiChi app until you installed the new app.
6. Enter the **Module Manage** activity by click the button "Module Manager" of the float button in Home page.
7. Check the SnapFreedom module.
8. Kill the process of SnapChat and the Xposed modules should work properly.(You don't need to reboot system)
Click to expand...
Click to collapse
Thanks for this great module, its nice to know there is hope for our locked bootloader devices.
I want to use snapfreedom, but the above steps wont actually work, snapchat will refuse to log me in since the signature of the apk has changed and its been uninstalled so my data is gone. Without root access I can't figure a way to copy my user data over to remain logged in. Any ideas would be greatly appreciated!
flamery said:
Thanks for this great module, its nice to know there is hope for our locked bootloader devices.
I want to use snapfreedom, but the above steps wont actually work, snapchat will refuse to log me in since the signature of the apk has changed and its been uninstalled so my data is gone. Without root access I can't figure a way to copy my user data over to remain logged in. Any ideas would be greatly appreciated!
Click to expand...
Click to collapse
The SnapChat itself refused you to login or other app can not login by Snapchat?
In fact, TaiChi non-root mode cheats the signature of app, if it cannot cheats SnapChat, i will look into it.
Depressed T.Bear said:
I noticed the magisk module today on the repo. Sounds very promising and... tempting to me.
But, regardless of how much I'd love to finally have xposed modules on pie, there's one major deal-breaker here: Closed source.
TaiChi magisk (as well as xposed) are extremely mighty - which makes it mandatory for us to see and confirm what's happening behind the curtains.
As soon as it gets open source, I'll be back and support this project.
Sent from my OnePlus 6 using XDA Labs
Click to expand...
Click to collapse
In fact, I’ve been tangled for a long time whether to open source the TaiChi.
Whether it's TaiChi or Xposed-Framework, they are so powerful that it's hard to believe its security if it's not open source. But there are some reasons for me to not open source it now:
1. TaiChi is a framework, it gives the same power to modules, modules can do all that TaiChi can do. In magisk-mode, TaiChi can control your device completely(Although I didn't do that), so dose the modules. If TaiChi is open-source but some modules don't, it is not secure too. You can choose to use only open-source modules, but others may not. There are so many excellent modules are closed-source, such as Greenify, Xposed Edge, Snapchat, etc. Only open source TaiChi is far from security if some module developer are malicious.
2. Open source doesn't mean security. VirtualXposed is open-source: https://github.com/android-hacker/VirtualXposed . But if you read the XDA Thread of it: https://forum.xda-developers.com/xpo...nlock-t3760313 . There are still so many users thinks it is not safe to use
Depressed T.Bear said:
I noticed the magisk module today on the repo. Sounds very promising and... tempting to me.
But, regardless of how much I'd love to finally have xposed modules on pie, there's one major deal-breaker here: Closed source.
TaiChi magisk (as well as xposed) are extremely mighty - which makes it mandatory for us to see and confirm what's happening behind the curtains.
As soon as it gets open source, I'll be back and support this project.
Sent from my OnePlus 6 using XDA Labs
Click to expand...
Click to collapse
In fact, I’ve been tangled for a long time whether to open source the TaiChi.
Whether it's TaiChi or Xposed-Framework, they are so powerful that it's hard to believe its security if it's not open source. But there are some reasons for me to not open source it now:
1. TaiChi is a framework, it gives the same power to modules, modules can do all that TaiChi can do. In magisk-mode, TaiChi can control your device completely(Although I didn't do that), so dose the modules. If TaiChi is open-source but some modules don't, it is not secure too. You can choose to use only open-source modules, but others may not. There are so many excellent modules are closed-source, such as Greenify, Xposed Edge, Snapchat, etc. Only open source TaiChi is far from security if some module developer are malicious.
2. Open source doesn't mean security. VirtualXposed is open-source: https://github.com/android-hacker/VirtualXposed . But if you read the XDA Thread of it: https://forum.xda-developers.com/xpo...nlock-t3760313 . There are still so many users thinks it is not safe to use.
Depressed T.Bear said:
I noticed the magisk module today on the repo. Sounds very promising and... tempting to me.
But, regardless of how much I'd love to finally have xposed modules on pie, there's one major deal-breaker here: Closed source.
TaiChi magisk (as well as xposed) are extremely mighty - which makes it mandatory for us to see and confirm what's happening behind the curtains.
As soon as it gets open source, I'll be back and support this project.
Sent from my OnePlus 6 using XDA Labs
Click to expand...
Click to collapse
In fact, I’ve been tangled for a long time whether to open source the TaiChi.
Whether it's TaiChi or Xposed-Framework, they are so powerful that it's hard to believe its security if it's not open source. But there are some reasons for me to not open source it now:
1. TaiChi is a framework, it gives the same power to modules, modules can do all that TaiChi can do. In magisk-mode, TaiChi can control your device completely(Although I didn't do that), so dose the modules. If TaiChi is open-source but some modules don't, it is not secure too. You can choose to use only open-source modules, but others may not. There are so many excellent modules are closed-source, such as Greenify, Xposed Edge, Snapchat, etc. Only open source TaiChi is far from security if some module developer are malicious.
2. Open source doesn't mean security. VirtualXposed is open-source: https://github.com/android-hacker/VirtualXposed . But if you read the XDA Thread of it: https://forum.xda-developers.com/xpo...nlock-t3760313 . There are still so many users thinks it is not safe to use. When it is closed-source, users think it is insecure becuase it is not open-source, when you open source it, users think it is insecure becuase no one to review the huge and ****-source code.
3. Xposed-Framework is not open-source after Android O, too. (correct me if i am wrong)
4. Closed-source can provide security for normal users. Closed source means that TaiChi can restrict the ****ing and harmful modules run in TaiChi(it won't load unknown modules). And also, The module developer won't worry about crack( it won't load the re-signed modules).
Happy to hear from all your advices.
weishu said:
In fact, I’ve been tangled for a long time whether to open source the TaiChi.
Whether it's TaiChi or Xposed-Framework, they are so powerful that it's hard to believe its security if it's not open source. But there are some reasons for me to not open source it now:
1. TaiChi is a framework, it gives the same power to modules, modules can do all that TaiChi can do. In magisk-mode, TaiChi can control your device completely(Although I didn't do that), so dose the modules. If TaiChi is open-source but some modules don't, it is not secure too. You can choose to use only open-source modules, but others may not. There are so many excellent modules are closed-source, such as Greenify, Xposed Edge, Snapchat, etc. Only open source TaiChi is far from security if some module developer are malicious.
2. Open source doesn't mean security. VirtualXposed is open-source: https://github.com/android-hacker/VirtualXposed . But if you read the XDA Thread of it: https://forum.xda-developers.com/xpo...nlock-t3760313 . There are still so many users thinks it is not safe to use
Click to expand...
Click to collapse
I think it is a pretty weak reasoning to not make the framework open source because the modules are closed source.
Both open and closed source do not mean security, so this is not a real argument either.
So, it lets me just wondering what the real reason is to not open source.
weishu said:
The SnapChat itself refused you to login or other app can not login by Snapchat?
In fact, TaiChi non-root mode cheats the signature of app, if it cannot cheats SnapChat, i will look into it.
Click to expand...
Click to collapse
Its the login to snapchat, they have very high security around 3rd party apps and app modding. If the apk has been modified you get the "login has temporarily failed" message when trying to login.
The workaround in the past has been to login with xposed disabled, titanium backup data, flash xposed, then restore data so you remain logged in. But there is no way to achieve that without root that I can see! thanks for looking into it!
so how do i enable the Magisk module?
Just tried Taichi today and it instantly bring the good old days for me with Xposed. I need to have certain Apps to run in different locale and Xposed module is to the only way to get this done! However Xposed also stopped Google pay so I have to stop using Xposed ever since.
With Taichi I can start use Xposed again and have Google Pay at the same time... Great solution!
Unfortunately with current international politics it immediately mark anything from China as insecure. I am not sure if TaiChi is secure or not, but I guess since the day I rooted my phone I am assuming all the risk inherited.
Anyway good work! Weishu! (Just donated)
Hmm I must be high on something because I dont see the download link.
woomera said:
Hmm I must be high on something because I dont see the download link.
Click to expand...
Click to collapse
Check the magisk manager downloads section.
@weishu , I hope you can help. I've purchased xprivacylua pro from the google play store some time ago and reinstalled it on Pie. Xprivacylua pro does not seem to recognize xprivacylua is installed also. Do you have any suggestions?
dirtyreturn said:
@weishu , I hope you can help. I've purchased xprivacylua pro from the google play store some time ago and reinstalled it on Pie. Xprivacylua pro does not seem to recognize xprivacylua is installed also. Do you have any suggestions?
Click to expand...
Click to collapse
It sounds like you misunderstood something. The "Pro" app from. Google Play is just a companion app, which enables the pro features you bought. It doesn't contain the actual xposed module (and app) of xprivacy Lua.
Simply download it through the xposed repo or get the latest apk directly from the xprivacy lua website.
Sent from my OnePlus 6 using XDA Labs
Depressed T.Bear said:
It sounds like you misunderstood something. The "Pro" app from. Google Play is just a companion app, which enables the pro features you bought. It doesn't contain the actual xposed module (and app) of xprivacy Lua.
Simply download it through the xposed repo or get the latest apk directly from the xprivacy lua website.
Click to expand...
Click to collapse
Thanks for the reply. I just assumed by my post it would make sense.
I do have the taichi magisk module installed, and from there I've installed xprivacylua. And from the google play store the pro companion app. @Depressed T.Bear - are you using xprivacylua on Pie? Does the pro app recognize the main app as installed for you?
Depressed T.Bear said:
It sounds like you misunderstood something. The "Pro" app from. Google Play is just a companion app, which enables the pro features you bought. It doesn't contain the actual xposed module (and app) of xprivacy Lua.
Simply download it through the xposed repo or get the latest apk directly from the xprivacy lua website.
Click to expand...
Click to collapse
Please see screenshots.
dirtyreturn said:
Thanks for the reply. I just assumed by my post it would make sense.
I do have the taichi magisk module installed, and from there I've installed xprivacylua. And from the google play store the pro companion app. @Depressed T.Bear - are you using xprivacylua on Pie? Does the pro app recognize the main app as installed for you?
Click to expand...
Click to collapse
Then it might be due to TaiChi.
Yes, I'm using XPrivacyLua on Pie - but with EdExposed and not with TaiChi. For one simple reason: TaiChi is not open source! EdExposed and RiruCore instead are.
So it would be absolute nonsense to use an app like XPrivacyLua to protect your privacy, while using a xposed version with is closed-source and nobody can tell what it actually does.
So, I can't help you with TaiChi. Only the developer can.
All I can say is that it works flawlessly with EdExposed.
Sent from my OnePlus 6 using XDA Labs
I have edxposed but I'm thinking of trying Taichi out to see if it's more stable. Will this work with modules such as xposed edge where the module doesnt target a specific app?
Soumy1234 said:
I have edxposed but I'm thinking of trying Taichi out to see if it's more stable. Will this work with modules such as xposed edge where the module doesnt target a specific app?
Click to expand...
Click to collapse
Your question is answered clearly in the first post
Sent from my OnePlus 6 using XDA Labs

is it such hard to root GameLoop 7.1.2

GameLoop is an Android Emulator which has two different variants
old GameLoop based on Android 4.4 (i am NOT talking about this variant)
new GameLoop based on Android 7.1.2 (i am talking about this variant)
In the setting of GameLoop there is an option about "abd debugging" and "root authority"I activated both of them.
If we don't activate them, the emulator doesn't shown in "adb devices"If we activate them, the umlator shown in "adb devices"
And we can use other adb commands.
But, it is not enough. In the emulator we cant use root authority.For example, we cant use titanium backup application.Because, root management apps don't work properly (magisk, supersu vs...)Becuse, supersu binaries is absent
I can not use root access in the emulator.
i have watched nearly all the videos on Youtube
i have read nearly all the articles on the web
Still i can not do this!
it's been a matter of pride for me
I am not a developer,
If a developer prepare an article how to do this , or record a video, i can do this
Please help me?
https://i.hizliresim.com/qiwgiti.png
https://www.hizliresim.com/3wat2uc
https://www.hizliresim.com/qcyjtpy
In fact, you can use rooted adb on gameloop 7.1 (AOW Engine) And you can install supersu, replacing the binary with adb -e push
The problem is that by doing that, all calls to "su" will trigger a driver_exception BSOD because there is a driver blocking it (AOW_DRV.SYS) Unfortunately there is no way around this as the entire AOW Engine runs on that driver. I guess Gameloop devs did this to prevent cheaters from using apps like Gameguardian that require root. Unfortunately so far there is no way or any method to do it, I'm just waiting for someone to do enough RE to the driver to bypass it.
Gameloop has another engine based on Virtualbox (Standard Engine) The latter can be easily rooted via adb. Even with a little work you can unpack android_system_disk.vdi and patch 2.img (boot image) to install magisk and then repack .vdi again.
The thing is that you will not be able to play games like PUBG or CODM on this engine.
The grace of this emulator is being able to use it to run games, I know there is no other that compares to it, but unfortunately the only alternative to be able to play and have root access is to use bluestacks 5 or you can also downgrade the version of gameloop to the one based on android 4.4, but this version is currently obsolete for current games and it's even worse than bluestacks in performance, it also doesn't support more than 60 fps
Cris840 said:
In fact, you can use rooted adb on gameloop 7.1 (AOW Engine) And you can install supersu, replacing the binary with adb -e push
The problem is that by doing that, all calls to "su" will trigger a driver_exception BSOD because there is a driver blocking it (AOW_DRV.SYS) Unfortunately there is no way around this as the entire AOW Engine runs on that driver. I guess Gameloop devs did this to prevent cheaters from using apps like Gameguardian that require root. Unfortunately so far there is no way or any method to do it, I'm just waiting for someone to do enough RE to the driver to bypass that driver.
Gameloop has another engine based on Virtualbox (Standard Engine) The latter can be easily rooted via adb. Even with a little work you can unpack android_system_disk.vdi and patch 2.img (boot image) to install magisk and then repack .vdi again.
The thing is that you will not be able to play games like PUBG or CODM on this engine.
The grace of this emulator is being able to use it to run games, I know there is no other that compares to it, but unfortunately the only alternative to be able to play and have root access is to use bluestacks 5 or you can also downgrade the version of gameloop to the one based on android 4.4, but this version is currently obsolete for current games and it's even worse than bluestacks in performance, it also doesn't support more than 60 fps
Click to expand...
Click to collapse
Thank you my friend for giving the most sensible answer to my question. This is the answer I've been wondering for a long time.
Cris840 said:
In fact, you can use rooted adb on gameloop 7.1 (AOW Engine) And you can install supersu, replacing the binary with adb -e push
The problem is that by doing that, all calls to "su" will trigger a driver_exception BSOD because there is a driver blocking it (AOW_DRV.SYS) Unfortunately there is no way around this as the entire AOW Engine runs on that driver. I guess Gameloop devs did this to prevent cheaters from using apps like Gameguardian that require root. Unfortunately so far there is no way or any method to do it, I'm just waiting for someone to do enough RE to the driver to bypass it.
Gameloop has another engine based on Virtualbox (Standard Engine) The latter can be easily rooted via adb. Even with a little work you can unpack android_system_disk.vdi and patch 2.img (boot image) to install magisk and then repack .vdi again.
The thing is that you will not be able to play games like PUBG or CODM on this engine.
The grace of this emulator is being able to use it to run games, I know there is no other that compares to it, but unfortunately the only alternative to be able to play and have root access is to use bluestacks 5 or you can also downgrade the version of gameloop to the one based on android 4.4, but this version is currently obsolete for current games and it's even worse than bluestacks in performance, it also doesn't support more than 60 fps
Click to expand...
Click to collapse
can you please tell me how to root Normal Standard Engine I want to block Ads in APPs on GameLoop Standard Engine, Hosts and VPN option not working.
Najam121 said:
can you please tell me how to root Normal Standard Engine I want to block Ads in APPs on GameLoop Standard Engine, Hosts and VPN option not working.
Click to expand...
Click to collapse
i can not
mkrts said:
i can not
Click to expand...
Click to collapse
Thanks for Replying, my problem was solved, I used some DNS App from PlayStore and it blocked Ads on Gameloop.

Possible to set ro properties with shizuku without root?

I've just looked into the KNOXPatch project which is supposed to run with shizuku/lspatch(lposed) and it seems to set to properties (project tells it needs root but i'm not sure about that)
GitHub - BlackMesa123/KnoxPatch: LSPosed module to get Samsung apps/features working again in your rooted Galaxy device.
LSPosed module to get Samsung apps/features working again in your rooted Galaxy device. - GitHub - BlackMesa123/KnoxPatch: LSPosed module to get Samsung apps/features working again in your rooted G...
github.com
It is a root module but can anybody tell if we could unlock developer settings? tried some debugging myself but need to get into android development again. If we would be able to set ro properties we might be able to get root and unlock bootloaders on a lot of devices. People keep talking about the impossibility to unlock bootloaders but if you look at the source code of the Samsung SecSettings app there are two kind of logic's, one to enable the oem onlock option and one to actually use it. It checks a lot of ro properties. Also we might be able to disable platform verification and install a system app to just execute the oem unlock option.

Categories

Resources