From 594ac7c8acf445c4ac0d4eb9e848274903b05a48 Mon Sep 17 00:00:00 2001 From: osm0sis Date: Wed, 24 Jan 2024 14:22:23 -0400 Subject: [PATCH] Prepare v7 --- CHANGELOG.md | 16 ++++++++-------- README.md | 15 ++++++++------- module/module.prop | 4 ++-- update.json | 6 +++--- 4 files changed, 21 insertions(+), 20 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 2104a49..4ad5f98 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,3 +1,11 @@ +## Custom Fork v7 +- Fix ROM non-/system spoof injection app replacement +- Add missing XiaomiEUInject-Stub to the default/example replace list +- Improve code, scripts and logging +- Fix ROM injection when using KernelSU and APatch +- Spoof init.svc.adbd to DroidGuard by default to further hide USB Debugging +- Improve hiding from detection by user apps + ## Custom Fork v6 - Improve migration script to be more portable, e.g. for desktop use - Add custom function to hack global props without increasing the change counter @@ -6,12 +14,4 @@ - Improve VERBOSE_LOGS to be any json entry, and dump full Build fields at 100 - Change DroidGuard prop spoof hooking method to Dobby for now -## Custom Fork v5 -- Allow spoofing literally any system property, supporting * lead wildcard to match multiple -- Remove all backwards compat cruft and deprecated entries -- Add log levels with VERBOSE_LOGS last json entry of 0, 1, 2, 3 or 100 -- Spoof sys.usb.state to DroidGuard by default to hide USB Debugging -- Update example json for properties -- Add migration script to automatically upgrade old custom.pif.json during install/update (may also be run manually) - _[Previous changelogs](https://github.com/osm0sis/PlayIntegrityFork/releases)_ diff --git a/README.md b/README.md index ad26ccc..d1caf91 100644 --- a/README.md +++ b/README.md @@ -10,9 +10,9 @@ A Zygisk module which fixes "ctsProfileMatch" (SafetyNet) and "MEETS_DEVICE_INTE To use this module you must have one of the following: -- [Magisk](https://github.com/topjohnwu/Magisk) with Zygisk (and, if not also using Shamiko, Enforce DenyList) enabled. -- [KernelSU](https://github.com/tiann/KernelSU) with [ZygiskNext](https://github.com/Dr-TSNG/ZygiskNext) module installed. -- [APatch](https://github.com/bmax121/APatch) with [ZygiskNext MOD](https://github.com/Yervant7/ZygiskNext) module installed. +- [Magisk](https://github.com/topjohnwu/Magisk) with Zygisk (and, if not also using Shamiko, Enforce DenyList) enabled +- [KernelSU](https://github.com/tiann/KernelSU) with [ZygiskNext](https://github.com/Dr-TSNG/ZygiskNext) module installed +- [APatch](https://github.com/bmax121/APatch) with [ZygiskNext MOD](https://github.com/Yervant7/ZygiskNext) module installed ## About module @@ -41,7 +41,7 @@ A migration may also be performed manually with `sh migrate.sh` and custom.pif.j ## About 'custom.app_replace.list' file -You can customize the included default [example.app_replace.list](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.app_replace.list) from the module directory then rename it to custom.app_replace.list to systemlessly replace any additional conflicting custom ROM injection app paths to disable them. +You can customize the included default [example.app_replace.list](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.app_replace.list) from the module directory then rename it to custom.app_replace.list to systemlessly replace any additional conflicting custom ROM spoof injection app paths to disable them. ## Troubleshooting @@ -50,10 +50,11 @@ You can customize the included default [example.app_replace.list](https://raw.gi If you are failing basicIntegrity (SafetyNet) or MEETS_BASIC_INTEGRITY (Play Integrity) something is wrong in your setup. Recommended steps in order to find the problem: - Disable all modules except this one +- Try a different (ideally known working) custom.pif.json Some modules which modify system can trigger DroidGuard detection, never hook GMS processes. -### Failing DEVICE verdict (on KernelSU) +### Failing DEVICE verdict (on KernelSU/APatch) - Disable ZygiskNext - Reboot @@ -63,13 +64,13 @@ Some modules which modify system can trigger DroidGuard detection, never hook GM Follow these steps: -- Flash the module in Magisk/KernelSU +- Reflash the module in your root manager app - Clear Google Wallet cache (if you have it) - Clear Google Play Store cache and data - Clear Google Play Services (com.google.android.gms) cache and data (Optionally skip clearing data and wait some time, ~24h, for it to resolve on its own) - Reboot -Note clearing Google Play Services app ***data*** will then require you to reset any WearOS devices paired to your device. +Note: Clearing Google Play Services app ***data*** will then require you to reset any WearOS devices paired to your device. ### Read module logs diff --git a/module/module.prop b/module/module.prop index 3f60014..c0ff86a 100644 --- a/module/module.prop +++ b/module/module.prop @@ -1,7 +1,7 @@ id=playintegrityfix name=Play Integrity Fork -version=v6 -versionCode=6001 +version=v7 +versionCode=70000 author=osm0sis & chiteroman @ xda-developers description=Fix CTS profile (SafetyNet) and DEVICE verdict (Play Integrity) updateJson=https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/update.json diff --git a/update.json b/update.json index 7a89c84..df426c4 100644 --- a/update.json +++ b/update.json @@ -1,6 +1,6 @@ { - "version": "v6", - "versionCode": 6000, - "zipUrl": "https://github.com/osm0sis/PlayIntegrityFork/releases/download/v6/PlayIntegrityFork-v6.zip", + "version": "v7", + "versionCode": 70000, + "zipUrl": "https://github.com/osm0sis/PlayIntegrityFork/releases/download/v7/PlayIntegrityFork-v7.zip", "changelog": "https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/CHANGELOG.md" }