# Magisk & LSPosed Modules

### **1. Magisk with Zygisk Enabled**

**Purpose:** Zygisk is Magisk’s new method for injecting modules directly into Android’s Zygote process. It replaces older Riru-based injection methods.

**Why it matters:** Most LSPosed modules require Zygisk to hook app code at runtime.

**Usage:**

* Open Magisk → Settings → **Enable Zygisk**.
* Reboot.
* Verify with `adb shell su -c magisk --zygisk`.

***

### **2. Shamiko**

**Type:** Magisk Zygisk Module **Purpose:** Bypasses **root detection** by hiding the presence of root from apps. It works with Magisk’s **DenyList** (which must be disabled in “Enforce mode” for Shamiko to handle hiding).

**Typical usage:**

* Install via Magisk Modules.
* Disable “Enforce DenyList” in Magisk settings.
* Configure hidden apps via Shamiko.

***

### **3. SSL Pinning Bypass – “Always Trust User Certificates”**

**Type:** LSPosed Module **Purpose:** Forces apps to trust all user-installed certificates, bypassing **certificate pinning** and enabling HTTPS interception with tools like **Burp Suite** or **Charles Proxy**.

**When to use:**

* You need to inspect HTTPS requests from apps that enforce their own CA store.
* Combine with `adb shell settings put global http_proxy ...` or VPN-based interception.

***

### **4. Magisk Hide**

**Type:** Magisk Feature (Legacy) **Purpose:** Old method for hiding root from apps. Mostly replaced by **Shamiko**, but still useful on older Android versions.

**Usage tip:** If using newer Magisk, this may not be available — Shamiko is the modern equivalent.

***

### **5. NoHello**

**Type:** LSPosed Module **Purpose:** Blocks apps that require “developer hello” handshakes or unnecessary startup checks. (Niche, used in certain anti-debug/bypass workflows.)

***

### **6. Hide Debugging**

**Type:** LSPosed Module **Purpose:** Prevents apps from detecting that a debugger is attached. Essential for **dynamic analysis** with Frida, Xposed, or JDWP without triggering anti-debug measures.

***

### **7. Hide My App List**

**Type:** LSPosed Module **Purpose:** Hides installed apps from detection — useful when target apps scan for reverse engineering tools like Frida, Burp, or game cheats.

**Usage for RASP bypass:**

* Add your target app to the module scope.
* Configure it to hide “blacklisted” packages from the app’s view.

***

### **8. I Am Not Developer**

**Type:** LSPosed Module **Purpose:** Bypasses developer mode detection by returning `false` for developer options flags. Useful for apps that refuse to run if developer mode is enabled.

***

### **Workflow Example**

For a typical app with strong protections:

1. **Root the device** with Magisk & enable Zygisk.
2. **Install Shamiko** → hide root.
3. **Enable Hide My App List** → hide tools.
4. **Enable Hide Debugging** → attach debugger safely.
5. **Enable SSL Pinning Bypass** → capture HTTPS traffic.
6. **Use I Am Not Developer** → block dev mode detection.

***

### **Disclaimer**

This guide is for **security research, penetration testing, and educational use**. Do **not** use these methods for malicious activity or without permission — doing so may violate laws and terms of service.
