PlayIntegrityFix Bypass your SafetyNet Attestation
This module attempts to fix Play Integrity verdicts to get a certified device on bootloader unlocked devices. To start using it you must need Magisk, KernelSU or Apatch, this is the recommended setup (choose only one):
- Magisk with Zygisk and deny list enabled.
- KernelSU with ZygiskNext module installed.
- Apatch with ZygiskNext MOD module installed.
Zygisk is mandatory and Shamiko is NOT needed.
This module is to penetrate some application security that requires bypassing device integrity. Usually it is root or custom ROM that causes the integrity of the device to become invalid.
For now, this module works by spoofing your device type to become a device whose fingerprint can still penetrate safetynet security. You can see it in your module in the pif.json file. Actually, you can change it as you like, but I don't recommend it.
Maybe if you know, this is a continuation module from the previous similar safetynet-fix module from kdrag0n, or other devs.
Notes:
- This module can be updated directly via your Magisk.
- Correctly remove conflict apps.
- Fix attestation issues in few devices.
- Fix bootloops.
Download:
You can check whether this module is working or not with third party applications such as YASNAC, TB Checker, Play Integrity API Checker, etc.
If you feel you understand and want to contribute, you can join here.
Shootz:
chiteroman - https://github.com/chiteroman/PlayIntegrityFix
Post a Comment