Skip to content

Google H*ck is a module designed to bypass play integrity checks, especially for China Roms, and offers advanced configuration and development capabilities.

Notifications You must be signed in to change notification settings

tryigit/PlayIntegrityFix

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

China?

Since all users generally use this module, China Rom developments are integrated into this module. So this module is recommended for official China Rom.

Caution

This module removes Magisk 32bit support permanently! The only way to restore 32bit support is to reinstall Magisk and other Zygisk modules. So install it with that in mind.

Diff Versions

PIFS China

Play Integrity Fix Advanced

New and improved version that passes the Strong test (Includes BL Hiding). Infrastructure from Lsposed developers. Target apps can be customized, does not affect the system. Default to affect all apps.

PIFS Required

  • Android 11+
  • Zygisk
  • 64bit cpu (armv8a)
  • Official Rom (China Recommended)
  • Magisk or KernelSU

PIFB China

Play Integrity Fix Lite

Old and less ram consuming method. It does not affect the other applications in the same way as the PIFS module, only the Google Gsf app hook.

PIFB Required

  • Android 10+
  • Zygisk
  • 64bit cpu (armv8a)
  • Any Rom (China Recommended)
  • TEE Supported Device (Not Broken)
  • Magisk or KernelSU

Warning

The reason fingerprints/keyboxs are banned inside the module is too many test checks. So do not check unnecessarily.

Features

  • Set motherboard to MP

The phone software recognizes your device's motherboard as the original motherboard.

  • Setting the motherboard country to China

Xiaomi may impose some restrictions on regional roms. Unfortunately, some phones like the Xiaomi 12T Pro require additional things like setting the model number. However, this feature is sufficient for models like the Xiaomi 13.

  • Permanently removing 32bit support for Magisk and modules

Magisk zygisk will not use ram unnecessarily. Also modules like lsposed.

Note

Shamiko and LSPosed module pushes 32bit support (file integrity check) and causes an error, report this to the Shamiko/LSPosed developer. Shamiko/LSPosed is excluded for now.

  • All System Apps Add Magiskhide List

Disabled by default. You have to modify the file manually to use it. You can enhance and pull req send if you want. If you are using custom roms, please do not use this feature.

  • Zygote 32bit lazyload support for Xiaomi devices

If you have a good processor, 32bit will use less ram. The basic logic is that zygote32 will not run unnecessarily until a 32bit application is opened. This feature may affect the opening speed of 32bit apps, but who cares? The dex2oat 32bit optimization is also disabled

  • Disable lsposed logs

Some apps can detect Zygisk by reading lsposed logs with getprop. This module prevents that.

  • Dynamic prop hiding

If there is a Shamiko module, it will not set props unnecessarily. It allows you to bypass simple bootloader checks if you do not have the Shamiko module.

  • Advanced bootloader hiding

You can prevent apps from detecting the bootloader lock. By default all apps, including system apps, are added to the target.txt file.

  • Prop spoof (PIFB)

Droidguard reads information like fingerprint and device model differently. So Hook. File is not set by default.

  • BL certificate spoof

The PIFB version only affects the gms app. It is simple and old. The PIFS version only affects target.txt apps and can be customized. Includes some advanced stuff. Both versions randomly replace a keybox file to avoid detection, and replace it on reboot.

Test fp/keybox without needing to reboot

su -c killall com.google.android.gms.unstable

Fingerprint File (PIFB)

in device

/data/adb/pif.json

Targer File (PIFS)

/data/adb/tricky_store/target.txt

Note

If you want to customize it, remove this file because it will be overwritten after every reboot.

/data/adb/tricky_store/AllAppsTarget.sh

Keybox File

in device

PIFB:

/data/adb/keybox.xml

PIFS:

/data/adb/tricky_store/keybox.xml

Simple Strong Guide: Just move the Keybox file you found to the right directory.

All Target Setting (PIFS)

Add all apps to the target.txt list automatically. It is enabled by default and needs to be removed to customize.

/data/adb/tricky_store/AllAppsTarget.sh

Advanced Settings

Add system apps to the Magiskhide list automatically (Currently Development). Move to file paths to active it.

Warning

There will be incompatibility with modules that modify system files such as GPU Driver. That is why it is not the default.

PIFB:

/data/adb/SystemAppAdd.sh

PIFS

/data/adb/tricky_store/AllTargetMagiskhide.sh

Motherboard Check

The factory location information on your phone's motherboard.

getprop ro.boot.hwc

Telegram

https://t.me/cleverestech

Note

I do not share my own projects on github (This project is only for updates), so this is a fork. You can see whose project I forked in the changelog.

These are just things that I make and use myself, and I share them because people want them, so I don't look at the issues much and I don't waste my time. It's not worth it.

About

Google H*ck is a module designed to bypass play integrity checks, especially for China Roms, and offers advanced configuration and development capabilities.

Resources

Stars

Watchers

Forks