2024-07-16 11:31:16 +08:00
2024-07-12 06:14:53 +08:00
2024-07-13 16:56:28 +08:00
2024-07-16 11:23:21 +08:00
2024-07-16 11:23:21 +08:00
2024-07-10 16:53:21 +08:00
2024-07-10 17:45:13 +08:00
2024-07-11 22:00:39 +08:00
2024-07-10 16:53:21 +08:00
2024-07-10 16:53:21 +08:00
2024-07-10 16:53:21 +08:00
2024-07-16 11:31:16 +08:00
2024-07-11 14:53:36 +08:00

Tricky Store

A trick of keystore.

Usage

  1. Flash this module and reboot.
  2. Put keybox.xml to /data/adb/tricky_store/keybox.xml .
  3. Put target packages to /data/adb/tricky_store/target.txt (Optional).
  4. Enjoy!

keybox.xml

format:

<?xml version="1.0"?>
<AndroidAttestation>
    <NumberOfKeyboxes>1</NumberOfKeyboxes>
    <Keybox DeviceID="...">
        <Key algorithm="ecdsa|rsa">
            <PrivateKey format="pem">
-----BEGIN EC PRIVATE KEY-----
...
-----END EC PRIVATE KEY-----
            </PrivateKey>
            <CertificateChain>
                <NumberOfCertificates>...</NumberOfCertificates>
                    <Certificate format="pem">
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
                    </Certificate>
                ... more certificates
            </CertificateChain>
        </Key>...
    </Keybox>
</AndroidAttestation>

Build Vars Spoofing

If you can not pass strong integrity, you can try to enable build vars spoofing by creating a file in /data/adb/modules/tricky_store/spoof_build_vars.

Zygisk (or Zygisk Next) is needed for this feature to work.

Leaf hack or fully generate

For target packages, TrickyStore will hack leaf certificate by default. On TEE broken devices, this will not work. You can add a ! after package name to enable fully generate mode.

For example:

# target.txt
# leaf hack for KeyAttestation App
io.github.vvb2060.keyattestation
# fully generate for gms
com.google.android.gms!
Description
No description provided
Readme 948 KiB
1.3.0 Latest
2025-06-18 12:17:54 +00:00
Languages
Markdown 100%