Logo Passei Direto
Buscar

Play_Integrity_Fix-v15 9 9(15990)

User badge image

Enviado por João pedro Alves de Oliveira em

Esta é uma pré-visualização de arquivo. Entre para ver o arquivo original

META-INF/com/google/android/update-binary
#!/sbin/sh
#################
# Initialization
#################
umask 022
# echo before loading util_functions
ui_print() { echo "$1"; }
require_new_magisk() {
 ui_print "*******************************"
 ui_print " Please install Magisk v20.4+! "
 ui_print "*******************************"
 exit 1
}
#########################
# Load util_functions.sh
#########################
OUTFD=$2
ZIPFILE=$3
mount /data 2>/dev/null
[ -f /data/adb/magisk/util_functions.sh ] || require_new_magisk
. /data/adb/magisk/util_functions.sh
[ $MAGISK_VER_CODE -lt 20400 ] && require_new_magisk
install_module
exit 0
META-INF/com/google/android/updater-script
#MAGISK
classes.dex
customize.sh
# Error on < Android 8.
if [ "$API" -lt 26 ]; then
 abort "- !!! You can't use this module on Android < 8.0"
fi
# safetynet-fix module is obsolete and it's incompatible with PIF.
if [ -d /data/adb/modules/safetynet-fix ]; then
 rm -rf /data/adb/modules/safetynet-fix
 rm -f /data/adb/SNFix.dex
 ui_print "! safetynet-fix module will be removed. Do NOT install it again along PIF."
fi
# MagiskHidePropsConf module is obsolete in Android 8+ but it shouldn't give issues.
if [ -d /data/adb/modules/MagiskHidePropsConf ]; then
 ui_print "! WARNING, MagiskHidePropsConf module may cause issues with PIF."
fi
# Check custom fingerprint
if [ -f "/data/adb/pif.json" ]; then
 mv -f "/data/adb/pif.json" "/data/adb/pif.json.old"
 ui_print "- Backup old pif.json"
fi
module.prop
id=playintegrityfix
name=Play Integrity Fix
version=v15.9.9
versionCode=15990
author=chiteroman
description=Universal modular fix for Play Integrity (and SafetyNet) on devices running Android 8-14.
updateJson=https://raw.githubusercontent.com/chiteroman/PlayIntegrityFix/main/update.json
pif.json
{
 "MANUFACTURER": "Google",
 "MODEL": "Pixel",
 "FINGERPRINT": "google/sailfish/sailfish:8.1.0/OPM1.171019.011/4448085:user/release-keys",
 "BRAND": "google",
 "PRODUCT": "sailfish",
 "DEVICE": "sailfish",
 "RELEASE": "8.1.0",
 "ID": "OPM1.171019.011",
 "INCREMENTAL": "4448085",
 "TYPE": "user",
 "TAGS": "release-keys",
 "SECURITY_PATCH": "2017-12-05",
 "DEVICE_INITIAL_SDK_INT": "25"
}
post-fs-data.sh
# Remove Play Services from Magisk Denylist when set to enforcing
if magisk --denylist status; then
 magisk --denylist rm com.google.android.gms
fi
# Remove safetynet-fix module if installed
if [ -d /data/adb/modules/safetynet-fix ]; then
 rm -rf /data/adb/modules/safetynet-fix
	rm -rf /data/adb/SNFix.dex
fi
resetprop_if_diff() {
 local NAME="$1"
 local EXPECTED="$2"
 local CURRENT="$(resetprop "$NAME")"
 [ -z "$CURRENT" ] || [ "$CURRENT" = "$EXPECTED" ] || resetprop "$NAME" "$EXPECTED"
}
resetprop_if_diff ro.build.tags release-keys
resetprop_if_diff ro.boot.warranty_bit 0
resetprop_if_diff ro.vendor.boot.warranty_bit 0
resetprop_if_diff ro.vendor.warranty_bit 0
resetprop_if_diff ro.warranty_bit 0
resetprop_if_diff ro.is_ever_orange 0
resetprop_if_diff ro.build.type user
resetprop_if_diff ro.debuggable 0
resetprop_if_diff ro.secure 1
service.sh
# Conditional sensitive properties
resetprop_if_diff() {
 local NAME="$1"
 local EXPECTED="$2"
 local CURRENT="$(resetprop "$NAME")"
 [ -z "$CURRENT" ] || [ "$CURRENT" = "$EXPECTED" ] || resetprop "$NAME" "$EXPECTED"
}
resetprop_if_match() {
 local NAME="$1"
 local CONTAINS="$2"
 local VALUE="$3"
 [[ "$(resetprop "$NAME")" = *"$CONTAINS"* ]] && resetprop "$NAME" "$VALUE"
}
# Magisk recovery mode
resetprop_if_match ro.bootmode recovery unknown
resetprop_if_match ro.boot.mode recovery unknown
resetprop_if_match vendor.boot.mode recovery unknown
# SELinux
resetprop_if_diff ro.boot.selinux enforcing
# use delete since it can be 0 or 1 for enforcing depending on OEM
if [ -n "$(resetprop ro.build.selinux)" ]; then
 resetprop --delete ro.build.selinux
fi
# use toybox to protect *stat* access time reading
if [ "$(toybox cat /sys/fs/selinux/enforce)" = "0" ]; then
 chmod 640 /sys/fs/selinux/enforce
 chmod 440 /sys/fs/selinux/policy
fi
# Late props which must be set after boot_completed
{
	until [[ "$(getprop sys.boot_completed)" == "1" ]]; do
		sleep 1
	done
	
	# SafetyNet/Play Integrity | Avoid breaking Realme fingerprint scanners
	resetprop_if_diff ro.boot.flash.locked 1
	
	# SafetyNet/Play Integrity | Avoid breaking Oppo fingerprint scanners
	resetprop_if_diff ro.boot.vbmeta.device_state locked
	
	# SafetyNet/Play Integrity | Avoid breaking OnePlus display modes/fingerprint scanners
	resetprop_if_diff vendor.boot.verifiedbootstate green
	
	# SafetyNet/Play Integrity | Avoid breaking OnePlus display modes/fingerprint scanners on OOS 12
	resetprop_if_diff ro.boot.verifiedbootstate green
	resetprop_if_diff ro.boot.veritymode enforcing
	resetprop_if_diff vendor.boot.vbmeta.device_state locked
}&
zygisk/arm64-v8a.so
zygisk/armeabi-v7a.so
zygisk/x86.so
zygisk/x86_64.so

Teste o Premium para desbloquear

Aproveite todos os benefícios por 3 dias sem pagar! 😉
Já tem cadastro?

Mais conteúdos dessa disciplina

Mais conteúdos dessa disciplina