unlocked-bootloader-backdoor-demo
Installs a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissions and without SELinux restrictions (by LuigiVampa92)
safetynet-fix
Google SafetyNet attestation workarounds for Magisk (by kdrag0n)
unlocked-bootloader-backdoor-demo | safetynet-fix | |
---|---|---|
3 | 222 | |
32 | 6,019 | |
- | - | |
0.0 | 1.0 | |
almost 3 years ago | 11 months ago | |
C++ | C++ | |
GNU General Public License v3.0 only | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
unlocked-bootloader-backdoor-demo
Posts with mentions or reviews of unlocked-bootloader-backdoor-demo.
We have used some of these posts to build our list of alternatives
and similar projects.
-
How android gets more vulnerable when rooted when it's still a Linux based OS ?
I actually made a proof-of-concept: https://github.com/LuigiVampa92/unlocked-bootloader-backdoor-demo
-
Should I be paranoid about security and privacy on Lineage OS 17.1?
It is possible. The only required thing is an unlocked bootloader, once you have it and you have a few minutes of physical access to the device you can install a persistent backdoor. No matter if there is a stock or a custom ROM on the device, no matter if there is root installed or not, no matter if device is encrypted or not. I even made a small proof of concept - you can check it here, just be careful and make a backup of partitions
-
LineageOS (in)security
I have made a research and created a proof-of-concept how an android device with an unlocked bootloader (which means that we talk about almost any device using custom ROM, root, etc) in case an adversary has a temporary physical access to it (a couple of minutes is enough) can be silently injected with a backdoor that will be successfully installed in almost any case, no matter which OS version it has, no matter if it’s encrypted or not, no matter if it has root or not. I have written an article about it. You can check it here (I’m sorry, it’s only in russian, but the google translate should work) and get the code here to test it yourself.
safetynet-fix
Posts with mentions or reviews of safetynet-fix.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-11-02.
-
[ROOT] Stuck in semi bootloop?
- I updated the universal safety net fix module for Magisk from v2.2 to 2.4.0 (https://github.com/kdrag0n/safetynet-fix/releases)
-
Android spoofing
Hi! I'm not new to spoofing, but with the "Android 7 no longer supported" update, my four Huawei G8 spoofing phones got obsolete and I have to set up some new phones. I'm trying to follow this tutorial: https://www.reddit.com/r/PokemonGoSpoofing/comments/11azleu/the\_definitive\_guide\_to\_rootingspoofing\_with\_an/ What I already did: -Installed TWRP -Installed Magisk -Installed PoGo -Opened smalli patcher with admin rights, and select only the first box "Mock Locations". -Copyed the created zip to the phone and installed it in Modules. (Step 7) Not sure about the right order of what comes next... Step 6: Download lsposed (zygisk) and safety-net fix zips, install with magisk. Add LSPosed shortcut to your homepage if prompted Lsposed link: https://github.com/LSPosed/LSPosed/releases Safety-net fix https://github.com/kdrag0n/safetynet-fix/releases DO I NEED TO DO STEP 6??? Step 7: DONE! Step 8: Update magisk settings: a. Click systemless hosts b. Enable Zygisk and enforce Denylist c. Configure Denylist and select com.google.android.gms (1st) and com.google.android.gms.unstable (3rd from the last) d.Hide magisk app in magisk settings so far so good, but I have no "com.google.android.gms (1st) and com.google.android.gms.unstable" to select. So, what to select??? Step 9: Download pokemon go and YASNAC safety net checker apps from play store - DONE! Step 10: Download HideMockLocations apk, install, and enable for pogo in lsposed - tryed the last 4 versions, always getting error "An error occurred while parsing the package" when trying to install. So, Step 10+11+12 not done yet Maybe I don't need all of the steps for my Galaxy S7?? This tutorial is MUCH less complicated: https://www.reddit.com/r/PokemonGoSpoofing/comments/a1d07r/a\_better\_way\_to\_spoof\_mini\_guide\_android\_root/ no word about Lsposed, no Safety-net fix, no Zygisk, no enforce Denylist, no Hide magisk app, no YASNAC safety net checker, no HideMockLocations apk This tutorial also doesn't say to do much after adding the smali module to Magisk: https://www.reddit.com/r/PokemonGoSpoofing/comments/glxdfv/rooted\_method\_1\_smali\_patcher\_guide\_for\_android/ I'm confused :D
-
[ROOTED METHOD #2] Smali Patcher Guide for Android 7, 8, 9, 10, and 11 with a Magisk Rooted device
Safetynet-fix-v2.4.0.zip from https://github.com/kdrag0n/safetynet-fix/releases.
-
DivestOS on hotdog (OnePlus 7T Pro) bootloader relocking & Banking app
Using a rooted CrDroid, I had the same app "error" but was able to make it work, using root and modules (Safetynet Fix) to hide Magisk, OS debug tools and Lineage fingerprint I guess.
- [Help] LineageOS + Magisk + Netflix/Disney+
-
Разкажете ми за проблемите, които имате с Huawei устройства БЕЗ Гугъл
https://github.com/kdrag0n/safetynet-fix (requires Magisk + MagiskHide Props Config
-
how tf do i fix this
Install shamiko by lsposed team and install universal safetynet bypass by krag0n as modules in magisk.
- I hate this
-
Some Android problems
UniversalSafetyNetFix
-
Sony Xperia - I decided to stay with iPhone
Hey there! Yes, there's one major pitfall, which is Google's SafetyNet. If an app asks "is SafetyNet working" and Google answers "no", the app can decide to not offer you services. In my case the one and only issue I had is a banking app refusing to let me use my fingerprint for login, but if you want to avoid it there's ways to fix that (like [safetynet-fix](https://github.com/kdrag0n/safetynet-fix))
What are some alternatives?
When comparing unlocked-bootloader-backdoor-demo and safetynet-fix you can also consider the following projects:
magisk-drm-disabler - Read-only mirror from GitLab. A Magisk module designed to disable DRM completely on Android
ih8sn
mtk-easy-su - Get bootless root access with few clicks.
LSPosed - LSPosed Framework
adguardcert - Magisk module that allows using AdGuard's HTTPS filtering for all apps
GPay-SQLite-Fix - A simple Magisk module to provide a Google Pay SQLite Fix (from XDA)
adb_root - Magisk Module that allows you to run "adb root". Android 10 only. Probably will work with Android 9. Definitely not with Android 11/12.
MagiskHidePropsConf - This tool is now dead...
adduser-dll - Simple DLL that add a user to the local Administrators group
Magisk - The Magic Mask for Android
Riru - Inject into zygote process
unlocked-bootloader-backdoor-demo vs magisk-drm-disabler
safetynet-fix vs ih8sn
unlocked-bootloader-backdoor-demo vs mtk-easy-su
safetynet-fix vs LSPosed
unlocked-bootloader-backdoor-demo vs adguardcert
safetynet-fix vs GPay-SQLite-Fix
unlocked-bootloader-backdoor-demo vs adb_root
safetynet-fix vs MagiskHidePropsConf
unlocked-bootloader-backdoor-demo vs adduser-dll
safetynet-fix vs Magisk
safetynet-fix vs magisk-drm-disabler
safetynet-fix vs Riru