You've already forked PlayIntegrityFork
mirror of
https://github.com/osm0sis/PlayIntegrityFork.git
synced 2025-09-06 06:37:06 +00:00
Prepare v7
This commit is contained in:
16
CHANGELOG.md
16
CHANGELOG.md
@@ -1,3 +1,11 @@
|
||||
## Custom Fork v7
|
||||
- Fix ROM non-/system spoof injection app replacement
|
||||
- Add missing XiaomiEUInject-Stub to the default/example replace list
|
||||
- Improve code, scripts and logging
|
||||
- Fix ROM injection when using KernelSU and APatch
|
||||
- Spoof init.svc.adbd to DroidGuard by default to further hide USB Debugging
|
||||
- Improve hiding from detection by user apps
|
||||
|
||||
## Custom Fork v6
|
||||
- Improve migration script to be more portable, e.g. for desktop use
|
||||
- Add custom function to hack global props without increasing the change counter
|
||||
@@ -6,12 +14,4 @@
|
||||
- Improve VERBOSE_LOGS to be any json entry, and dump full Build fields at 100
|
||||
- Change DroidGuard prop spoof hooking method to Dobby for now
|
||||
|
||||
## Custom Fork v5
|
||||
- Allow spoofing literally any system property, supporting * lead wildcard to match multiple
|
||||
- Remove all backwards compat cruft and deprecated entries
|
||||
- Add log levels with VERBOSE_LOGS last json entry of 0, 1, 2, 3 or 100
|
||||
- Spoof sys.usb.state to DroidGuard by default to hide USB Debugging
|
||||
- Update example json for properties
|
||||
- Add migration script to automatically upgrade old custom.pif.json during install/update (may also be run manually)
|
||||
|
||||
_[Previous changelogs](https://github.com/osm0sis/PlayIntegrityFork/releases)_
|
||||
|
||||
15
README.md
15
README.md
@@ -10,9 +10,9 @@ A Zygisk module which fixes "ctsProfileMatch" (SafetyNet) and "MEETS_DEVICE_INTE
|
||||
|
||||
To use this module you must have one of the following:
|
||||
|
||||
- [Magisk](https://github.com/topjohnwu/Magisk) with Zygisk (and, if not also using Shamiko, Enforce DenyList) enabled.
|
||||
- [KernelSU](https://github.com/tiann/KernelSU) with [ZygiskNext](https://github.com/Dr-TSNG/ZygiskNext) module installed.
|
||||
- [APatch](https://github.com/bmax121/APatch) with [ZygiskNext MOD](https://github.com/Yervant7/ZygiskNext) module installed.
|
||||
- [Magisk](https://github.com/topjohnwu/Magisk) with Zygisk (and, if not also using Shamiko, Enforce DenyList) enabled
|
||||
- [KernelSU](https://github.com/tiann/KernelSU) with [ZygiskNext](https://github.com/Dr-TSNG/ZygiskNext) module installed
|
||||
- [APatch](https://github.com/bmax121/APatch) with [ZygiskNext MOD](https://github.com/Yervant7/ZygiskNext) module installed
|
||||
|
||||
## About module
|
||||
|
||||
@@ -41,7 +41,7 @@ A migration may also be performed manually with `sh migrate.sh` and custom.pif.j
|
||||
|
||||
## About 'custom.app_replace.list' file
|
||||
|
||||
You can customize the included default [example.app_replace.list](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.app_replace.list) from the module directory then rename it to custom.app_replace.list to systemlessly replace any additional conflicting custom ROM injection app paths to disable them.
|
||||
You can customize the included default [example.app_replace.list](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.app_replace.list) from the module directory then rename it to custom.app_replace.list to systemlessly replace any additional conflicting custom ROM spoof injection app paths to disable them.
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
@@ -50,10 +50,11 @@ You can customize the included default [example.app_replace.list](https://raw.gi
|
||||
If you are failing basicIntegrity (SafetyNet) or MEETS_BASIC_INTEGRITY (Play Integrity) something is wrong in your setup. Recommended steps in order to find the problem:
|
||||
|
||||
- Disable all modules except this one
|
||||
- Try a different (ideally known working) custom.pif.json
|
||||
|
||||
Some modules which modify system can trigger DroidGuard detection, never hook GMS processes.
|
||||
|
||||
### Failing DEVICE verdict (on KernelSU)
|
||||
### Failing DEVICE verdict (on KernelSU/APatch)
|
||||
|
||||
- Disable ZygiskNext
|
||||
- Reboot
|
||||
@@ -63,13 +64,13 @@ Some modules which modify system can trigger DroidGuard detection, never hook GM
|
||||
|
||||
Follow these steps:
|
||||
|
||||
- Flash the module in Magisk/KernelSU
|
||||
- Reflash the module in your root manager app
|
||||
- Clear Google Wallet cache (if you have it)
|
||||
- Clear Google Play Store cache and data
|
||||
- Clear Google Play Services (com.google.android.gms) cache and data (Optionally skip clearing data and wait some time, ~24h, for it to resolve on its own)
|
||||
- Reboot
|
||||
|
||||
Note clearing Google Play Services app ***data*** will then require you to reset any WearOS devices paired to your device.
|
||||
Note: Clearing Google Play Services app ***data*** will then require you to reset any WearOS devices paired to your device.
|
||||
|
||||
### Read module logs
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
id=playintegrityfix
|
||||
name=Play Integrity Fork
|
||||
version=v6
|
||||
versionCode=6001
|
||||
version=v7
|
||||
versionCode=70000
|
||||
author=osm0sis & chiteroman @ xda-developers
|
||||
description=Fix CTS profile (SafetyNet) and DEVICE verdict (Play Integrity)
|
||||
updateJson=https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/update.json
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"version": "v6",
|
||||
"versionCode": 6000,
|
||||
"zipUrl": "https://github.com/osm0sis/PlayIntegrityFork/releases/download/v6/PlayIntegrityFork-v6.zip",
|
||||
"version": "v7",
|
||||
"versionCode": 70000,
|
||||
"zipUrl": "https://github.com/osm0sis/PlayIntegrityFork/releases/download/v7/PlayIntegrityFork-v7.zip",
|
||||
"changelog": "https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/CHANGELOG.md"
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user