unlocked-bootloader-backdoor-demo VS safetynet-fix

Compare unlocked-bootloader-backdoor-demo vs safetynet-fix and see what are their differences.

unlocked-bootloader-backdoor-demo

Installs a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissions and without SELinux restrictions (by LuigiVampa92)

safetynet-fix

Google SafetyNet attestation workarounds for Magisk (by kdrag0n)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
unlocked-bootloader-backdoor-demo safetynet-fix
3 222
32 6,019
- -
0.0 1.0
almost 3 years ago 11 months ago
C++ C++
GNU General Public License v3.0 only MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

unlocked-bootloader-backdoor-demo

Posts with mentions or reviews of unlocked-bootloader-backdoor-demo. We have used some of these posts to build our list of alternatives and similar projects.
  • How android gets more vulnerable when rooted when it's still a Linux based OS ?
    1 project | /r/linux | 27 Apr 2021
    I actually made a proof-of-concept: https://github.com/LuigiVampa92/unlocked-bootloader-backdoor-demo
  • Should I be paranoid about security and privacy on Lineage OS 17.1?
    1 project | /r/LineageOS | 25 Mar 2021
    It is possible. The only required thing is an unlocked bootloader, once you have it and you have a few minutes of physical access to the device you can install a persistent backdoor. No matter if there is a stock or a custom ROM on the device, no matter if there is root installed or not, no matter if device is encrypted or not. I even made a small proof of concept - you can check it here, just be careful and make a backup of partitions
  • LineageOS (in)security
    1 project | /r/LineageOS | 20 Mar 2021
    I have made a research and created a proof-of-concept how an android device with an unlocked bootloader (which means that we talk about almost any device using custom ROM, root, etc) in case an adversary has a temporary physical access to it (a couple of minutes is enough) can be silently injected with a backdoor that will be successfully installed in almost any case, no matter which OS version it has, no matter if it’s encrypted or not, no matter if it has root or not. I have written an article about it. You can check it here (I’m sorry, it’s only in russian, but the google translate should work) and get the code here to test it yourself.

safetynet-fix

Posts with mentions or reviews of safetynet-fix. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-02.
  • [ROOT] Stuck in semi bootloop?
    1 project | /r/OnePlus6 | 11 Nov 2023
    - I updated the universal safety net fix module for Magisk from v2.2 to 2.4.0 (https://github.com/kdrag0n/safetynet-fix/releases)
  • Android spoofing
    2 projects | /r/PokemonGoSpoofing | 2 Nov 2023
    Hi! I'm not new to spoofing, but with the "Android 7 no longer supported" update, my four Huawei G8 spoofing phones got obsolete and I have to set up some new phones. I'm trying to follow this tutorial: https://www.reddit.com/r/PokemonGoSpoofing/comments/11azleu/the\_definitive\_guide\_to\_rootingspoofing\_with\_an/ What I already did: -Installed TWRP -Installed Magisk -Installed PoGo -Opened smalli patcher with admin rights, and select only the first box "Mock Locations". -Copyed the created zip to the phone and installed it in Modules. (Step 7) Not sure about the right order of what comes next... Step 6: Download lsposed (zygisk) and safety-net fix zips, install with magisk. Add LSPosed shortcut to your homepage if prompted Lsposed link: https://github.com/LSPosed/LSPosed/releases Safety-net fix https://github.com/kdrag0n/safetynet-fix/releases DO I NEED TO DO STEP 6??? Step 7: DONE! Step 8: Update magisk settings: a. Click systemless hosts b. Enable Zygisk and enforce Denylist c. Configure Denylist and select com.google.android.gms (1st) and com.google.android.gms.unstable (3rd from the last) d.Hide magisk app in magisk settings so far so good, but I have no "com.google.android.gms (1st) and com.google.android.gms.unstable" to select. So, what to select??? Step 9: Download pokemon go and YASNAC safety net checker apps from play store - DONE! Step 10: Download HideMockLocations apk, install, and enable for pogo in lsposed - tryed the last 4 versions, always getting error "An error occurred while parsing the package" when trying to install. So, Step 10+11+12 not done yet Maybe I don't need all of the steps for my Galaxy S7?? This tutorial is MUCH less complicated: https://www.reddit.com/r/PokemonGoSpoofing/comments/a1d07r/a\_better\_way\_to\_spoof\_mini\_guide\_android\_root/ no word about Lsposed, no Safety-net fix, no Zygisk, no enforce Denylist, no Hide magisk app, no YASNAC safety net checker, no HideMockLocations apk This tutorial also doesn't say to do much after adding the smali module to Magisk: https://www.reddit.com/r/PokemonGoSpoofing/comments/glxdfv/rooted\_method\_1\_smali\_patcher\_guide\_for\_android/ I'm confused :D
  • [ROOTED METHOD #2] Smali Patcher Guide for Android 7, 8, 9, 10, and 11 with a Magisk Rooted device
    2 projects | /r/MonsterHunterSpoofing | 24 Sep 2023
    Safetynet-fix-v2.4.0.zip from https://github.com/kdrag0n/safetynet-fix/releases.
  • DivestOS on hotdog (OnePlus 7T Pro) bootloader relocking & Banking app
    1 project | /r/DivestOS | 7 Sep 2023
    Using a rooted CrDroid, I had the same app "error" but was able to make it work, using root and modules (Safetynet Fix) to hide Magisk, OS debug tools and Lineage fingerprint I guess.
  • [Help] LineageOS + Magisk + Netflix/Disney+
    1 project | /r/Magisk | 10 Jul 2023
  • Разкажете ми за проблемите, които имате с Huawei устройства БЕЗ Гугъл
    1 project | /r/bulgaria | 27 Jun 2023
    https://github.com/kdrag0n/safetynet-fix (requires Magisk + MagiskHide Props Config
  • how tf do i fix this
    2 projects | /r/standoff2game | 21 Jun 2023
    Install shamiko by lsposed team and install universal safetynet bypass by krag0n as modules in magisk.
  • I hate this
    2 projects | /r/androidroot | 10 Jun 2023
  • Some Android problems
    3 projects | /r/AndroidQuestions | 8 Jun 2023
    UniversalSafetyNetFix
  • Sony Xperia - I decided to stay with iPhone
    1 project | /r/SonyXperia | 31 May 2023
    Hey there! Yes, there's one major pitfall, which is Google's SafetyNet. If an app asks "is SafetyNet working" and Google answers "no", the app can decide to not offer you services. In my case the one and only issue I had is a banking app refusing to let me use my fingerprint for login, but if you want to avoid it there's ways to fix that (like [safetynet-fix](https://github.com/kdrag0n/safetynet-fix))

What are some alternatives?

When comparing unlocked-bootloader-backdoor-demo and safetynet-fix you can also consider the following projects:

magisk-drm-disabler - Read-only mirror from GitLab. A Magisk module designed to disable DRM completely on Android

ih8sn

mtk-easy-su - Get bootless root access with few clicks.

LSPosed - LSPosed Framework

adguardcert - Magisk module that allows using AdGuard's HTTPS filtering for all apps

GPay-SQLite-Fix - A simple Magisk module to provide a Google Pay SQLite Fix (from XDA)

adb_root - Magisk Module that allows you to run "adb root". Android 10 only. Probably will work with Android 9. Definitely not with Android 11/12.

MagiskHidePropsConf - This tool is now dead...

adduser-dll - Simple DLL that add a user to the local Administrators group

Magisk - The Magic Mask for Android

Riru - Inject into zygote process