Magisk & LSPosed Modules
1. Magisk with Zygisk Enabled
Purpose: Zygisk is Magisk’s new method for injecting modules directly into Android’s Zygote process. It replaces older Riru-based injection methods.
Why it matters: Most LSPosed modules require Zygisk to hook app code at runtime.
Usage:
Open Magisk → Settings → Enable Zygisk.
Reboot.
Verify with
adb shell su -c magisk --zygisk
.
2. Shamiko
Type: Magisk Zygisk Module Purpose: Bypasses root detection by hiding the presence of root from apps. It works with Magisk’s DenyList (which must be disabled in “Enforce mode” for Shamiko to handle hiding).
Typical usage:
Install via Magisk Modules.
Disable “Enforce DenyList” in Magisk settings.
Configure hidden apps via Shamiko.
3. SSL Pinning Bypass – “Always Trust User Certificates”
Type: LSPosed Module Purpose: Forces apps to trust all user-installed certificates, bypassing certificate pinning and enabling HTTPS interception with tools like Burp Suite or Charles Proxy.
When to use:
You need to inspect HTTPS requests from apps that enforce their own CA store.
Combine with
adb shell settings put global http_proxy ...
or VPN-based interception.
4. Magisk Hide
Type: Magisk Feature (Legacy) Purpose: Old method for hiding root from apps. Mostly replaced by Shamiko, but still useful on older Android versions.
Usage tip: If using newer Magisk, this may not be available — Shamiko is the modern equivalent.
5. NoHello
Type: LSPosed Module Purpose: Blocks apps that require “developer hello” handshakes or unnecessary startup checks. (Niche, used in certain anti-debug/bypass workflows.)
6. Hide Debugging
Type: LSPosed Module Purpose: Prevents apps from detecting that a debugger is attached. Essential for dynamic analysis with Frida, Xposed, or JDWP without triggering anti-debug measures.
7. Hide My App List
Type: LSPosed Module Purpose: Hides installed apps from detection — useful when target apps scan for reverse engineering tools like Frida, Burp, or game cheats.
Usage for RASP bypass:
Add your target app to the module scope.
Configure it to hide “blacklisted” packages from the app’s view.
8. I Am Not Developer
Type: LSPosed Module Purpose: Bypasses developer mode detection by returning false
for developer options flags. Useful for apps that refuse to run if developer mode is enabled.
Workflow Example
For a typical app with strong protections:
Root the device with Magisk & enable Zygisk.
Install Shamiko → hide root.
Enable Hide My App List → hide tools.
Enable Hide Debugging → attach debugger safely.
Enable SSL Pinning Bypass → capture HTTPS traffic.
Use I Am Not Developer → block dev mode detection.
Disclaimer
This guide is for security research, penetration testing, and educational use. Do not use these methods for malicious activity or without permission — doing so may violate laws and terms of service.
Last updated
Was this helpful?