Since all users generally use this module, China Rom developments are integrated into this module. So this module is recommended for official China Rom.
Caution
This module removes Magisk 32bit support permanently! The only way to restore 32bit support is to reinstall Magisk and other Zygisk modules. So install it with that in mind.
Play Integrity Fix Advanced
New and improved version that passes the Strong test (Includes BL Hiding). Infrastructure from Lsposed developers. Target apps can be customized, does not affect the system. Default to affect all apps.
- Android 11+
- Zygisk
- 64bit cpu (armv8a)
- Official Rom (China Recommended)
- Magisk or KernelSU
Play Integrity Fix Lite
Old and less ram consuming method. It does not affect the other applications in the same way as the PIFS module, only the Google Gsf app hook.
- Android 10+
- Zygisk
- 64bit cpu (armv8a)
- Any Rom (China Recommended)
- TEE Supported Device (Not Broken)
- Magisk or KernelSU
Warning
The reason fingerprints/keyboxs are banned inside the module is too many test checks. So do not check unnecessarily.
- Set motherboard to MP
The phone software recognizes your device's motherboard as the original motherboard.
- Setting the motherboard country to China
Xiaomi may impose some restrictions on regional roms. Unfortunately, some phones like the Xiaomi 12T Pro require additional things like setting the model number. However, this feature is sufficient for models like the Xiaomi 13.
- Permanently removing 32bit support for Magisk and modules
Magisk zygisk will not use ram unnecessarily. Also modules like lsposed.
Note
Shamiko and LSPosed module pushes 32bit support (file integrity check) and causes an error, report this to the Shamiko/LSPosed developer. Shamiko/LSPosed is excluded for now.
- All System Apps Add Magiskhide List
Disabled by default. You have to modify the file manually to use it. You can enhance and pull req send if you want. If you are using custom roms, please do not use this feature.
- Zygote 32bit lazyload support for Xiaomi devices
If you have a good processor, 32bit will use less ram. The basic logic is that zygote32 will not run unnecessarily until a 32bit application is opened. This feature may affect the opening speed of 32bit apps, but who cares? The dex2oat 32bit optimization is also disabled
- Disable lsposed logs
Some apps can detect Zygisk by reading lsposed logs with getprop. This module prevents that.
- Dynamic prop hiding
If there is a Shamiko module, it will not set props unnecessarily. It allows you to bypass simple bootloader checks if you do not have the Shamiko module.
- Advanced bootloader hiding
You can prevent apps from detecting the bootloader lock. By default all apps, including system apps, are added to the target.txt file.
- Prop spoof (PIFB)
Droidguard reads information like fingerprint and device model differently. So Hook. File is not set by default.
- BL certificate spoof
The PIFB version only affects the gms app. It is simple and old. The PIFS version only affects target.txt apps and can be customized. Includes some advanced stuff. Both versions randomly replace a keybox file to avoid detection, and replace it on reboot.
su -c killall com.google.android.gms.unstable
in device
/data/adb/pif.json
/data/adb/tricky_store/target.txt
Note
If you want to customize it, remove this file because it will be overwritten after every reboot.
/data/adb/tricky_store/AllAppsTarget.sh
in device
PIFB:
/data/adb/keybox.xml
PIFS:
/data/adb/tricky_store/keybox.xml
Simple Strong Guide: Just move the Keybox file you found to the right directory.
Add all apps to the target.txt list automatically. It is enabled by default and needs to be removed to customize.
/data/adb/tricky_store/AllAppsTarget.sh
Add system apps to the Magiskhide list automatically (Currently Development). Move to file paths to active it.
Warning
There will be incompatibility with modules that modify system files such as GPU Driver. That is why it is not the default.
PIFB:
/data/adb/SystemAppAdd.sh
PIFS
/data/adb/tricky_store/AllTargetMagiskhide.sh
The factory location information on your phone's motherboard.
getprop ro.boot.hwc
Note
I do not share my own projects on github (This project is only for updates), so this is a fork. You can see whose project I forked in the changelog.
These are just things that I make and use myself, and I share them because people want them, so I don't look at the issues much and I don't waste my time. It's not worth it.