termux-packages
safetynet-fix
Our great sponsors
termux-packages | safetynet-fix | |
---|---|---|
328 | 222 | |
12,161 | 5,990 | |
2.0% | - | |
10.0 | 1.0 | |
5 days ago | 10 months ago | |
Shell | C++ | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
termux-packages
-
Usbredir: A protocol for sending USB device traffic over a network connection
usbredirect, USB drives/disks, Termux, termux-usb, QEMU, and Alpine Linux in action in April 2024 on an Android 11 phone that is not rooted --> Update-6, Update-7, Update-8, Update-9, Update-10 at https://github.com/termux/termux-packages/issues/19635
"USB Network Redirection protocol description version 0.7 (19 May 2014)": https://gitlab.freedesktop.org/spice/usbredir/-/blob/main/do... (gitlab.freedesktop.org/spice/usbredir/-/blob/main/docs/usb-redirection-protocol.md)
"How to use Spice "Open remote computing"" Hans de Goede "@ T-DOSE 2011, Eindhoven": https://www.youtube.com/watch?v=e1fC3GOTHOY (www.youtube.com/watch?v=e1fC3GOTHOY)
-
"Is it Worth Rooting your Phone in 2023?"
Phone (not rooted) running Android 11 and Termux doing superuser/root operations on a USB flash drive connected to the phone, for example "cryptsetup luksFormat /dev/sda1" and "mkfs.ext4 /dev/mapper/v1" --> Update-6 through Update-8 and "Connecting a USB device to QEMU using termux, termux-usb, usbredirect" at https://github.com/termux/termux-packages/issues/19635 (see also Update-9, Update-10, Update-11).
-
Security of an encrypted partition in a flash drive
Done on a phone that is not rooted running Termux, termux-usb, usbredirect, and QEMU --> "cryptsetup luksFormat /dev/sda1" and "cryptsetup luksOpen /dev/sda1 v1" and "mkfs.ext4 /dev/mapper/v1" and "mount /dev/mapper/v1 /root/1" where "/dev/sda1" is a partition on a USB flash drive ("dev/sda") plugged in the phone: https://github.com/termux/termux-packages/issues/19635 (github.com/termux/termux-packages/issues/19635'cryptsetup)
- "Connecting a USB device to QEMU using termux, termux-USB, usbredirect"
-
PinePhone review after a month of daily driving
Yes. Even without enabling root, you can install Termux[1] and have a full Linux cli environment with ssh.
> don't understand not more people want to access their DCIM folder via sshfs
I agree. I sync my camera folder with Syncthing[1], so as soon as I take a photo it is available on my laptop.
1: https://termux.dev/
-
Termux: Linux Applications on Android
As usual don't forget that Android/Linux isn't GNU/Linux,
https://github.com/termux/termux-packages/wiki/Termux-and-An...
https://developer.android.com/ndk/guides/stable_apis
https://android.googlesource.com/platform/bionic/+/master/an...
- GNU Guix into Termux
-
A standalone zero-dependency Lisp for Linux
With this, I was able to cross compile lone for x86_64 from within the Termux environment of my aarch64 smartphone. All I had to do was obtain the Linux user space API headers for x86_64.
I made a Termux package request for multiplatform Linux UAPI headers specifically so I could cross compile lone but unfortunately it was rejected.
https://github.com/termux/termux-packages/issues/16069
-
Why SQLite Does Not Use Git
I wonder how far you could get with the git client in termux. I got vim running at one point.
[1] https://termux.dev/
[2] https://packages.termux.dev/apt/termux-main/pool/main/g/git/
-
Crystal is now available on Termux AArch64
Crystal can be installed with just pkg install crystal. If you have Docker, you could also clone the build environment and try building Crystal locally with scripts/run-docker.sh scripts/build-package.sh -I -a aarch64 crystal.
safetynet-fix
-
[ROOT] Stuck in semi bootloop?
- I updated the universal safety net fix module for Magisk from v2.2 to 2.4.0 (https://github.com/kdrag0n/safetynet-fix/releases)
-
Android spoofing
Hi! I'm not new to spoofing, but with the "Android 7 no longer supported" update, my four Huawei G8 spoofing phones got obsolete and I have to set up some new phones. I'm trying to follow this tutorial: https://www.reddit.com/r/PokemonGoSpoofing/comments/11azleu/the\_definitive\_guide\_to\_rootingspoofing\_with\_an/ What I already did: -Installed TWRP -Installed Magisk -Installed PoGo -Opened smalli patcher with admin rights, and select only the first box "Mock Locations". -Copyed the created zip to the phone and installed it in Modules. (Step 7) Not sure about the right order of what comes next... Step 6: Download lsposed (zygisk) and safety-net fix zips, install with magisk. Add LSPosed shortcut to your homepage if prompted Lsposed link: https://github.com/LSPosed/LSPosed/releases Safety-net fix https://github.com/kdrag0n/safetynet-fix/releases DO I NEED TO DO STEP 6??? Step 7: DONE! Step 8: Update magisk settings: a. Click systemless hosts b. Enable Zygisk and enforce Denylist c. Configure Denylist and select com.google.android.gms (1st) and com.google.android.gms.unstable (3rd from the last) d.Hide magisk app in magisk settings so far so good, but I have no "com.google.android.gms (1st) and com.google.android.gms.unstable" to select. So, what to select??? Step 9: Download pokemon go and YASNAC safety net checker apps from play store - DONE! Step 10: Download HideMockLocations apk, install, and enable for pogo in lsposed - tryed the last 4 versions, always getting error "An error occurred while parsing the package" when trying to install. So, Step 10+11+12 not done yet Maybe I don't need all of the steps for my Galaxy S7?? This tutorial is MUCH less complicated: https://www.reddit.com/r/PokemonGoSpoofing/comments/a1d07r/a\_better\_way\_to\_spoof\_mini\_guide\_android\_root/ no word about Lsposed, no Safety-net fix, no Zygisk, no enforce Denylist, no Hide magisk app, no YASNAC safety net checker, no HideMockLocations apk This tutorial also doesn't say to do much after adding the smali module to Magisk: https://www.reddit.com/r/PokemonGoSpoofing/comments/glxdfv/rooted\_method\_1\_smali\_patcher\_guide\_for\_android/ I'm confused :D
-
[ROOTED METHOD #2] Smali Patcher Guide for Android 7, 8, 9, 10, and 11 with a Magisk Rooted device
Safetynet-fix-v2.4.0.zip from https://github.com/kdrag0n/safetynet-fix/releases.
-
DivestOS on hotdog (OnePlus 7T Pro) bootloader relocking & Banking app
Using a rooted CrDroid, I had the same app "error" but was able to make it work, using root and modules (Safetynet Fix) to hide Magisk, OS debug tools and Lineage fingerprint I guess.
- [Help] LineageOS + Magisk + Netflix/Disney+
-
Разкажете ми за проблемите, които имате с Huawei устройства БЕЗ Гугъл
https://github.com/kdrag0n/safetynet-fix (requires Magisk + MagiskHide Props Config
-
how tf do i fix this
Install shamiko by lsposed team and install universal safetynet bypass by krag0n as modules in magisk.
- I hate this
-
Some Android problems
UniversalSafetyNetFix
-
Sony Xperia - I decided to stay with iPhone
Hey there! Yes, there's one major pitfall, which is Google's SafetyNet. If an app asks "is SafetyNet working" and Google answers "no", the app can decide to not offer you services. In my case the one and only issue I had is a banking app refusing to let me use my fingerprint for login, but if you want to avoid it there's ways to fix that (like [safetynet-fix](https://github.com/kdrag0n/safetynet-fix))
What are some alternatives?
nix-on-droid - Nix-enabled environment for your Android device.
ih8sn
UserLAnd - Main UserLAnd Repository
LSPosed - LSPosed Framework
Code-Server - VS Code in the browser
GPay-SQLite-Fix - A simple Magisk module to provide a Google Pay SQLite Fix (from XDA)
xmrig - Monero (rx/0, rx/wow, rx/loki, defyx, rx/arq, rx/sfx, rx/keva, cn/0, cn/1, cn/2, cn/r, cn/fast, cn/half, cn/xao, cn/rto, cn/rwz, cn/zls, cn/double, cn/gpu, cn-lite/0, cn-lite/1, cn-heavy/0, cn-heavy/tube, cn-heavy/xhv, cn-pico, cn-pico/tlo, argon2/chukwa, argon2/wrkz, astrobwt) CPU/GPU miner
MagiskHidePropsConf - This tool is now dead...
chromium - The official GitHub mirror of the Chromium source
Magisk - The Magic Mask for Android
android-tools - Android tools built for Android devices.
magisk-drm-disabler - Read-only mirror from GitLab. A Magisk module designed to disable DRM completely on Android