You've already forked TrickyStore
mirror of
https://github.com/5ec1cff/TrickyStore.git
synced 2025-09-06 06:37:07 +00:00
Compare commits
8 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
26b274cf58 | ||
|
|
140e212ebc | ||
|
|
1d92796ed1 | ||
|
|
50e3ce31f6 | ||
|
|
86b7eb1a8b | ||
|
|
29a22a461c | ||
|
|
df6d697e0f | ||
|
|
edc6cdab08 |
36
README.md
36
README.md
@@ -1,15 +1,15 @@
|
||||
# Tricky Store
|
||||
|
||||
A trick of keystore. **Android 12 or above is required**.
|
||||
A trick of keystore. **Android 10 or above is required**.
|
||||
|
||||
This module is used for modifying the certificate chain generated for android key attestation.
|
||||
|
||||
## Stop opening source / 停止开源
|
||||
[中文 README](README.zh-CN.md)
|
||||
|
||||
## Stop opening source
|
||||
|
||||
Due to the rampant misuse and the contributions received after open-sourcing being less than expected, this module will be closed-source starting from version 1.1.0.
|
||||
|
||||
考虑到二改泛滥,且开源后获得的贡献少于预期,因此本模块自 1.1.0 版本起闭源发布。
|
||||
|
||||
## Usage
|
||||
|
||||
1. Flash this module and reboot.
|
||||
@@ -69,9 +69,33 @@ io.github.vvb2060.mahoshojo?
|
||||
com.google.android.gms!
|
||||
```
|
||||
|
||||
## TODO
|
||||
## Customize security patch level (1.2.1+)
|
||||
|
||||
- [Support Android 11 and below.](https://github.com/5ec1cff/TrickyStore/issues/25#issuecomment-2250588463)
|
||||
Create the file `/data/adb/tricky_store/security_patch.txt`.
|
||||
|
||||
Simple:
|
||||
|
||||
```
|
||||
# Hack os/vendor/boot security patch level
|
||||
20241101
|
||||
```
|
||||
|
||||
Advanced:
|
||||
|
||||
```
|
||||
# os security patch level is 202411
|
||||
system=202411
|
||||
# do not hack boot patch level
|
||||
boot=no
|
||||
# vendor patch level is 20241101 (another format)
|
||||
vendor=2024-11-01
|
||||
# default value
|
||||
# all=20241101
|
||||
# keep consistent with system prop
|
||||
# system=prop
|
||||
```
|
||||
|
||||
Note: this feature will only hack the result of KeyAttestation, it will not do resetprop, you need do it yourself.
|
||||
|
||||
## Acknowledgement
|
||||
|
||||
|
||||
105
README.zh-CN.md
Normal file
105
README.zh-CN.md
Normal file
@@ -0,0 +1,105 @@
|
||||
# Tricky Store
|
||||
|
||||
**支持 Android 10 及以上版本**.
|
||||
|
||||
该模块用于修改 Android Keystore 生成的 Android KeyAttestation 证书链。
|
||||
|
||||
[中文 README](README.zh-CN.md)
|
||||
|
||||
## 停止开源
|
||||
|
||||
考虑到二改泛滥,且开源后获得的贡献少于预期,因此本模块自 1.1.0 版本起闭源发布。
|
||||
|
||||
## 用法
|
||||
|
||||
1. 刷入模块并重启。
|
||||
2. For more than DEVICE integrity, put an unrevoked hardware keybox.xml at `/data/adb/tricky_store/keybox.xml` (可选)。
|
||||
3. 在 `/data/adb/tricky_store/target.txt` 自定义修改生效的应用包名(可选) 。
|
||||
4. 大功告成!
|
||||
|
||||
**所有配置会立即生效**
|
||||
|
||||
## keybox.xml
|
||||
|
||||
format:
|
||||
|
||||
```xml
|
||||
<?xml version="1.0"?>
|
||||
<AndroidAttestation>
|
||||
<NumberOfKeyboxes>1</NumberOfKeyboxes>
|
||||
<Keybox DeviceID="...">
|
||||
<Key algorithm="ecdsa|rsa">
|
||||
<PrivateKey format="pem">
|
||||
-----BEGIN EC PRIVATE KEY-----
|
||||
...
|
||||
-----END EC PRIVATE KEY-----
|
||||
</PrivateKey>
|
||||
<CertificateChain>
|
||||
<NumberOfCertificates>...</NumberOfCertificates>
|
||||
<Certificate format="pem">
|
||||
-----BEGIN CERTIFICATE-----
|
||||
...
|
||||
-----END CERTIFICATE-----
|
||||
</Certificate>
|
||||
... more certificates
|
||||
</CertificateChain>
|
||||
</Key>...
|
||||
</Keybox>
|
||||
</AndroidAttestation>
|
||||
```
|
||||
|
||||
## 支持 TEE 损坏的设备
|
||||
|
||||
TrickyStore 默认采用修改来自 TEE 的叶证书的方式。
|
||||
这在 TEE 损坏的设备上无法工作,因为 TEE 无法提供证书链。
|
||||
因此,TrickyStore 会自动切换到生成证书链模式。
|
||||
|
||||
在 target.txt 中,在包名后添加一个 `!` 可以强制使用生成证书链模式。
|
||||
添加 `?` 到包名后可强制使用修改证书链模式。如无后缀则自动选择。
|
||||
|
||||
例子
|
||||
|
||||
```
|
||||
# target.txt
|
||||
# 对 KeyAttestation App 使用自动模式
|
||||
io.github.vvb2060.keyattestation
|
||||
# 对 momo 使用修改证书链模式
|
||||
io.github.vvb2060.mahoshojo?
|
||||
# 对 gms 使用生成证书链模式
|
||||
com.google.android.gms!
|
||||
```
|
||||
|
||||
## 自定义安全补丁级别(1.2.1+)
|
||||
|
||||
配置文件 `/data/adb/tricky_store/security_patch.txt`
|
||||
|
||||
简易:
|
||||
|
||||
```
|
||||
# 修改 os/vendor/boot 的安全补丁级别
|
||||
20241101
|
||||
```
|
||||
|
||||
高级:
|
||||
|
||||
```
|
||||
# os 安全补丁级别为 202411
|
||||
system=202411
|
||||
# 不要修改 boot 安全补丁级别
|
||||
boot=no
|
||||
# vendor 安全补丁级别 20241101 (使用了另一种格式)
|
||||
vendor=2024-11-01
|
||||
# 默认值
|
||||
# all=20241101
|
||||
# system 安全补丁级别与系统属性一致
|
||||
# system=prop
|
||||
```
|
||||
|
||||
注意:该功能仅修改 KeyAttestation 返回的结果,不会重置系统属性。
|
||||
|
||||
## Acknowledgement
|
||||
|
||||
- [FrameworkPatch](https://github.com/chiteroman/FrameworkPatch)
|
||||
- [BootloaderSpoofer](https://github.com/chiteroman/BootloaderSpoofer)
|
||||
- [KeystoreInjection](https://github.com/aviraxp/Zygisk-KeystoreInjection)
|
||||
- [LSPosed](https://github.com/LSPosed/LSPosed)
|
||||
61
changelog.md
61
changelog.md
@@ -1,18 +1,59 @@
|
||||
# 1.1.1
|
||||
# 1.3.0
|
||||
|
||||
修复自动模式与生成模式下的多个 bug
|
||||
|
||||
支持在 root 管理器内更新
|
||||
|
||||
|
||||
注:Magisk 用户从 1.1.0 版本升级时可能出现模块被自动禁用的现象。此为旧版问题,重新启用并重启即可。
|
||||
- 支持 KeyMint 4.0 新增的 moduleHash 字段
|
||||
- 支持 Android 16
|
||||
- 修复偶发注入失败的问题
|
||||
- 将 Play 商店加入默认作用列表
|
||||
- 修复大量证书链生成问题
|
||||
|
||||
---
|
||||
|
||||
Fix some bugs in auto and generated modes.
|
||||
- Support for the new moduleHash field introduced in KeyMint 4.0
|
||||
- Compatibility with Android 16
|
||||
- Fixed occasional injection failures
|
||||
- Added Play Store to the default scope list
|
||||
- Resolved numerous certificate chain generation issues
|
||||
|
||||
Support update in root manager.
|
||||
# 1.2.1
|
||||
|
||||
支持自定义安全补丁级别(请参见 README.md)
|
||||
|
||||
Note: Magisk users may experience the module being automatically disabled when upgrading from version 1.1.0. This is an issue in old version, simply re-enable the module and reboot.
|
||||
---
|
||||
|
||||
Support customizing security patch level (please refer to README.md)
|
||||
|
||||
# 1.2.0
|
||||
|
||||
修复注入失败的问题
|
||||
修复安装失败的问题
|
||||
修复 cert hack 下报错的问题
|
||||
|
||||
---
|
||||
|
||||
Fixed the injection failure issue
|
||||
Fixed the installation failure issue
|
||||
Fixed the error issue under cert hack
|
||||
|
||||
# 1.2.0-RC2
|
||||
|
||||
修改叶证书模式同时会修改安全等级与信任根为非软件
|
||||
修复缺失的 osVersion 字段
|
||||
|
||||
---
|
||||
|
||||
Leaf hack mode will also change the security level and root of trust to non-software based
|
||||
Fix missing osVersion field
|
||||
|
||||
# 1.2.0-RC1
|
||||
|
||||
初步支持 Android 10-11 (感谢 @N-X-T )
|
||||
自动模式会检测是否支持硬件加密
|
||||
修复模块损坏问题
|
||||
修复证书签名算法选择的问题
|
||||
|
||||
---
|
||||
|
||||
Add initial support for Android 10-11 (Thanks @N-X-T )
|
||||
Auto mode will detect if hardware encryption is supported
|
||||
Fix issue that module may be corrupted
|
||||
Fix issue with certificate signature algorithm selection
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
{
|
||||
"versionCode": 118,
|
||||
"version": "v1.1.1",
|
||||
"zipUrl": "https://github.com/5ec1cff/TrickyStore/releases/download/1.1.1/Tricky-Store-v1.1.1-118-7c164d3-release.zip",
|
||||
"versionCode": 180,
|
||||
"version": "v1.3.0",
|
||||
"zipUrl": "https://github.com/5ec1cff/TrickyStore/releases/download/1.3.0/Tricky-Store-v1.3.0-180-8acfa57-release.zip",
|
||||
"changelog": "https://github.com/5ec1cff/TrickyStore/raw/release/changelog.md"
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user