English | Português
XDA Thread: https://xdaforums.com/t/app-vd-infos-package-com-vitaodoidao-vdinfos.4097379/
As we all know, Android is a super powerful and super versatile operating system.
What nobody tells you is that all your personal details and confidential information are available for all your installed applications.
Protect yourself against these types of invasions of privacy is an obligation.
The VD Infos app reads several of these details and information to show you an example of what can be captured from your device in use.
NO ONE INFORMATION IS STORED, SENT OR TRANSMITTED TO ANY FILE OR SERVER.
If you want, you can disallow usage of internet with a firewall, or you can just turn off the internet.
- Just for curious.
- See your device informations.
- Test your hooks and spoofs.
- English
- Portuguese
- ULTRA ROOT CHECKER/DETECTOR.
- ULTRA MAGISK CHECKER/DETECTOR.
- ULTRA XPOSED CHECKER/DETECTOR.
- ULTRA RIRU CHECKER/DETECTOR.
- Simple Root Check (Fast and Quickly).
- Check many ways to detect android emulators.
- Check many ways to detect busybox, whale framework, taichi frameworks, xposedbridge, lsposed, edxposed, virtualxposed, vaexposed, exposed, quickxposed, sandvxposed, zhihuxposed, xhook, supersu, suhide, luckypatcher, deviceemulator, rootcloak, xprivacy, xprivacylua, ebxprivacy, titaniumbackup, deviceidmasker and others.
- Read Bluetooth MAC and VISIBLE NAME.
- Read bounded bluetooth devices.
- Read radio/modem/baseband version.
- Read the state of the BOOTLOADER.
- Read device name.
- Read phone infos: Market Name, Device, Brand, Model, Product, Display ID, Manufacturer, Hardware.
- Read Android infos: Host, Type, Build Date and Android Version.
- Read phone system: KERNEL, MEMORY, Security Patch and System Version.
- Read encryption infos.
- Read build keys.
- Read REGION.
- Read Advertising ID.
- Detects currently Selinux configuration.
- Read build properties.
- Read Android ID.
- Read GSF ID (Google Services Framework).
- Read IMEI (of all SIMs).
- Read FINGERPRINT.
- Check many ways to read SERIAL number.
- List ACCOUNTS.
- List CALL LOGS.
- Read User-Agent (http.agent and getUserAgentString).
- List SIM informations (of all SIMs).
- List PHONE informations.
- List WIFI informations (like MAC, IP, NAME, DNS, DHCP and previously connected WIFIs).
- List NETWORK informations (each one).
- List RUNNING PROCESSES.
- List RUNNING SERVICES.
- List INSTALLED PACKAGES.
- List INSTALLED APPLICATIONS.
- Blank's Integrity Guide: A guide to how to hide root and pass Strong Integrity.
https://t.me/BlankAssistance/7/2437
https://t.me/BlankAssistance
https://t.me/BlankAssistance_Integrity - Android Root Detected by @VD_Priv8: Solutions for Android Rooted Devices and things about actual apps detecting root. Also a big collection of Telegram Channels & Groups and GitHub & other Repos Links.
https://t.me/RootDetected - HUBERTHUB: Everything root related + sometimes Xiaomi.
https://t.me/HubertHub - Zer0 Zone: Root & Xposed, Tech Updates & Facts, Tools.
https://t.me/z3ro_zone - DroidHub.pro: Some stuff about android.
https://t.me/droidhub_pro - Guide to Bypass DexProtector Apps: This will guide you on bypassing apps that use protectors such as DexProtector.
https://telegra.ph/Guide-to-Bypass-DexProtector-Apps-01-31 - Tutorial SUSFF: How to install SUSFS.
http://www.reddit.com/r/Magisk/comments/1i7sowe/tutorial_susfs_best_root_hiding_method_currently/ - Android Kernel Tutorials: Kernel building tutorials for Any device for newbies..!
https://github.com/ravindu644/Android-Kernel-Tutorials - Simple Android Guides: Learn about Android stuffs from Scratch. Useful for Newbies.
https://github.com/ravindu644/Simple-Android-Guides - Magisk: A suite of open source software for customizing Android, supporting devices higher than Android 6.0.
https://github.com/topjohnwu/Magisk
https://xdaforums.com/t/magisk-the-magic-mask-for-android.3473445/ - Magisk Alpha: A fork of Magisk.
https://t.me/magiskalpha - APatch: The patching of Android kernel and Android system.
https://github.com/bmax121/APatch
https://t.me/APatchChannel
https://t.me/apatch_discuss
https://xdaforums.com/t/dev-apatch-an-alternative-root-solution-to-kernelsu-and-magisk.4655727/ - APatch Next: A fork of APatch.
https://t.me/app_process64 - KernelSU: A Kernel-based root solution for Android devices.
https://github.com/tiann/KernelSU
https://t.me/KernelSU
https://t.me/KernelSU_group - KernelSuNext: A fork of KernelSU.
https://github.com/rifsxd/KernelSU-Next
https://t.me/ksunext
https://t.me/ksunext_group - KernelSU by backslashxx: A fork of KernelSU.
https://github.com/backslashxx/KernelSU
https://t.me/krenalxx - KernelSU by 5ec1cff: A fork of KernelSU.
https://github.com/5ec1cff/KernelSU
https://t.me/mksu_ci - SukiSU: A fork of KernelSU.
https://github.com/ShirkNeko/KernelSU
https://t.me/SukiSU_Ci - Shizuku: Using system APIs directly with adb/root privileges from normal apps through a Java process started with app_process.
https://github.com/RikkaApps/Shizuku - Ksu WebUI Standalone: Implementação independente do do WebUI do KernelSU. Adequado para Magisk, Kernelsu e Apatch.
https://github.com/5ec1cff/KsuWebUIStandalone - MMRL - Magisk Module Repo Loader: An app that helps manage your own modules repository.
https://github.com/MMRLApp/MMRL
https://t.me/MMRLApp
https://t.me/MMRLGroup
https://t.me/MMRLCI - LSPatch: Rootless implementation of LSPosed framework, integrating Xposed API by inserting dex and so into the target APK.
https://github.com/LSPosed/LSPatch
https://t.me/LSPatchArchives - LSPatch by JingMatrix: A fork of LSPatch.
https://github.com/JingMatrix/LSPatch - Abootloop: A Magisk Module to protect from bootloop.
https://github.com/Magisk-Modules-Alt-Repo/abootloop
https://github.com/nedorazrab0/abootloop - YetAnotherBootloopProtector: A module try to protect your device from bootloops and system ui failures caused by Magisk/KernelSU/APatch Modules.
https://github.com/Magisk-Modules-Alt-Repo/YetAnotherBootloopProtector
https://github.com/rhythmcache/YetAnotherBootloopProtector - LSPosed: Successor of Xposed Framework.
https://xdaforums.com/t/lsposed-xposed-framework-8-1-13-0-simple-magisk-module.4228973/
https://github.com/LSPosed/LSPosed
https://t.me/LSPosed
https://t.me/LSPosedDiscussion
https://t.me/LSPosedArchives
https://t.me/lsposed_log - LSPosed Internal: A fork of LSPosed by its own developers.
https://t.me/LSPosed/287 - LSPosed by Dev4Mod: A fork of LSPosed.
https://github.com/Dev4Mod/LSPosed - LSPosed by JingMatrix: A fork of LSPosed.
https://github.com/JingMatrix/LSPosed - LSPosed Irena: A fork of LSPosed.
https://github.com/re-zero001/LSPosed-Irena - LSPosed NPM: A fork of LSPosed.
https://t.me/rormzhstjxm - LSPosed_mod by mywalkb: A fork of LSPosed.
https://github.com/mywalkb/LSPosed_mod - LSPosed by CMDQ8575: A fork of LSPosed.
https://github.com/CMDQ8575/LSPosed - Dreamland Framework: A Xposed framework implementation, you can use it to use Xposed modules.
https://github.com/canyie/Dreamland
https://t.me/DreamlandFramework - Dreamland Manager: Installer and manager of the Dreamland framework.
https://github.com/canyie/DreamlandManager
https://t.me/DreamlandFramework - XPL-EX (XPrivacyLua Extended): A fork of XPrivacyLua.
https://xdaforums.com/t/xpl-ex-xprivacylua-ex-android-privacy-manager-hooking-manager-extended.4652573/
https://github.com/0bbedCode/XPL-EX
https://t.me/XPL_EX
https://t.me/XPL_EX_CHAT - XPL-EX Pro (XPrivacyLua Extended Pro): A fork of XPrivacyLuaPro.
https://github.com/0bbedCode/XPL-EX/releases - WeiJu2: The first scriptable xposed module, provides a new way to change the application behavior. Powered by Lua and made with ♥
https://xdaforums.com/t/app-xposed-7-0-weiju2-scriptable-xposed-module.4482585/
https://github.com/ikws4/WeiJu2 - Shamiko: A Zygisk module to hide Magisk root, Zygisk itself and Zygisk modules.
https://github.com/LSPosed/LSPosed.github.io/releases - Zygisk-Assistant: A Zygisk module to hide root for KernelSU, Magisk and APatch, designed to work on Android 5.0 and above.
https://github.com/snake-4/Zygisk-Assistant
https://xdaforums.com/t/module-zygisk-assistant-foss-root-hider.4664761/ - Cherish Peekaboo: Some kind of alternative to Shamiko for APatch.
https://t.me/app_process64 - Sensitive Props mod: Reset sensitive properties to safe state.
https://www.pling.com/p/2129780
https://github.com/Pixel-Props/sensitive-props
https://t.me/PixelProps
https://t.me/pixelpropschat - Zygisk-maphide: Wipe out the traces of mounted files of Magisk module for process on DenyList.
https://github.com/HuskyDG/zygisk-maphide - ZygiskNext: Standalone implementation of Zygisk, providing Zygisk API support for KernelSU and a replacement of Magisk's built-in Zygisk.
https://github.com/Dr-TSNG/ZygiskNext
https://t.me/real5ec1cff
https://t.me/nullptr_dev - Zygisk_mod: An open-source fork of Zygisk Next.
https://github.com/Admirepowered/Zygisk_mod - ReZygisk: A fork of Zygisk Next, which is a standalone implementation of Zygisk, providing Zygisk API support for KernelSU, Magisk (besides built-in) and APatch (work in progress).
https://github.com/PerformanC/ReZygisk
https://t.me/rezygisk
https://t.me/rezygiskchat
https://t.me/performancorg - NeoZygisk: A Zygote injection module implemented using ptrace, which provides Zygisk API support for APatch/KernelSU and serves as a replacement of Magisk's built-in Zygisk.
https://github.com/JingMatrix/NeoZygisk - Tricky Store: A trick of keystore.
https://github.com/5ec1cff/TrickyStore
https://xdaforums.com/t/tricky-store-the-next-generation-pif.4683446/
https://t.me/real5ec1cff
https://t.me/nullptr_dev - TrickyStore by N-X-T: A fork of TrickyStore.
https://github.com/N-X-T/TrickyStore - TrickyStore by tryigit: A fork of TrickyStore.
https://github.com/tryigit/TrickyStore - Zygisk-KeystoreInjection: Generate a valid certificate chain from scratch by injecting custom Keystore provider.
https://github.com/aviraxp/Zygisk-KeystoreInjection - PlayIntegrityFix: The module tries to fix Play Integrity and SafetyNet verdicts to get a valid attestation.
https://github.com/chiteroman/PlayIntegrityFix
https://xdaforums.com/t/module-play-integrity-fix-safetynet-fix.4607985/
https://t.me/playintegrityfix
https://t.me/playintegrityfixchat
https://t.me/chiteroman_chat - PlayIntegrityFork: A fork of PlayIntegrityFix, to be more futureproof and develop more methodically.
https://github.com/osm0sis/PlayIntegrityFork - PlayIntegrityFix by tryigit: A fork of PlayIntegrityFix.
https://github.com/tryigit/PlayIntegrityFix - PlayIntegrityNEXT: A module that downloads a working fingerprint instead of making a fork every time. The module is called 'playcurl,' and you simply need to install it alongside the official PlayIntegrityFix.
https://github.com/daboynb/PlayIntegrityNEXT - AutoPIF Next - PlayIntegrity Fix Next Fork: Automatically download working pif.json online from the repository and bypass Google Play Integrity Check.
https://xdaforums.com/t/module-autopif-next-play-integrity-fix-fork-safetynet-fix.4652252/
https://github.com/x1337cn/AutoPIF-Next - playcurlNEXT: Fingerprint downloader for play integrity fix.
https://github.com/daboynb/playcurlNEXT - BetterKnownInstalled: This Magisk/KernelSU/APatch module patches the packages.xml and cleans the packages-warnings.xml files to address DroidGuard's UNKNOWN_INSTALLED status. This helps resolve issues related to app installation and verification on devices with Play Services.
https://github.com/Pixel-Props/BetterKnownInstalled - BetterKnownInstalledGO: A fork of BetterKnownInstalled.
https://github.com/frknkrc44/BetterKnownInstalledGO - Android-XML-Converter: Standalone abx2xml and xml2abx. An experimental code to convert between android xml formats (abx and xml).
https://github.com/rhythmcache/android-xml-converter - Android-VBMeta-Fixer: A Magisk/KernelSU/Apatch module to fix VBMeta detections on Android.
https://github.com/reveny/Android-VBMeta-Fixer
https://t.me/reveny1
https://t.me/revenychat - VBMeta Disguiser: A Magisk module to disguise VBMeta props and the encryption status.
https://github.com/Astoritin/VBMetaDisguiser - ZygiskDetach: Zygisk module to detach installed apps from Play Store, hooking binder.
https://github.com/j-hc/zygisk-detach - Zygisk Detach App: The app for zygisk-detach.
https://github.com/j-hc/zygisk-detach-app - Core Patch: Disable signature verification for Android.
https://github.com/Xposed-Modules-Repo/com.coderstory.toolkit
https://github.com/LSPosed/CorePatch - PMPatch: Disable signature verification for Android.
https://github.com/vova7878-modules/PMPatch - LetMeDowngrade: Add support for downgrading apps on Android 12 through 15 QPR1.
https://github.com/DavidBerdik/Let-Me-Downgrade - Framework Patch: Modify framework.jar to build on system level a valid certificate chain
https://github.com/chiteroman/FrameworkPatch - Framework Patcher GO: A Magisk/KernelSU/APatch module to modify framework.jar directly on the phone, to build a valid system-level certificate chain.
https://github.com/changhuapeng/FrameworkPatcherGO
https://xdaforums.com/t/module-framework-patcher-go.4674536/ - Crond Start Jobs: Use crond to schedule tasks.
https://github.com/mengshouer/crond_start_jobs - PathProvider: Inject MAGISKTMP into env's PATH.
https://github.com/aviraxp/PathProvider - SettingsFirewall: An Xposed module that blocks shitty apps from accessing your system settings (for example, check if development settings is enabled on the device, or check if there are running accessibility services).
https://github.com/canyie/SettingsFirewall
https://t.me/CanyieChannel - Hide My AppList: An Xposed module to hide apps or reject app list requests.
https://github.com/Dr-TSNG/Hide-My-Applist
https://t.me/HideMyApplist - HMAL: A fork of Hide My AppList.
https://github.com/pumPCin/HMAL - Guide HMA: A quick guide to hopefully make it a little easier for people new to Hide My Applist.
https://github.com/mModule/guide_hma - Guide for Hide My Applist: A guide for Hide My Applist.
https://telegra.ph/Guide-for-Hide-My-Applist-01-31 - Geergit: A Module to Protect Your Privacy.
https://xdaforums.com/t/app-xposed-5-0-13-geergit-a-module-to-protect-your-privacy.4573243/
https://github.com/pyshivam/geergit-discussion
https://github.com/Xposed-Modules-Repo/com.pyshivam.geergit
https://t.me/geergit_xposed - Android Faker: A Module For Spoofing Your Device.
https://xdaforums.com/t/app-xposed-8-1-13-android-faker-a-module-for-spoof-your-device.4284233
https://github.com/Android1500/AndroidFaker
https://github.com/Xposed-Modules-Repo/com.android1500.androidfaker
https://t.me/androidfakerofficial - Device ID Masker: Spoof your vital private information from Third Party As Well As System Apps.
https://bytesreverserapps.com/device-id-masker/ - E-Government Liberator (formerly Digitales Amt Liberator): E-Government Liberator removes any calls in supported Austrian e-government apps to root and bootloader checks and therefore provides a tailored solution to running the app on rooted devices.
https://github.com/Crazyphil/digitales-amt-liberator - BootloaderSpoofer: Spoof locked bootloader on local attestations.
https://github.com/chiteroman/BootloaderSpoofer
https://xdaforums.com/t/spoof-locked-bootloader-bypass-tee-check.4586251/ - App Errors Tracking: Added more features to app's errors dialog, fixed custom rom deleted dialog, the best experience to Android developer.
https://github.com/KitsunePie/AppErrorsTracking - Wa Revamp: An Xposed Module to customize and enable privacy on WhatsApp.
https://github.com/ItsMadruga/WaRevamp
https://t.me/warevampmodule
https://t.me/WaRevampGroup - Wa Enhancer: An Xposed Module to customize and enable privacy on WhatsApp.
https://t.me/waenhancer
https://t.me/waenhancher
https://github.com/Dev4Mod/WaEnhancer - Insta Eclipse: An Instagram enhancer module with features like Developer Options, Ghost Mode, Ad-Free browsing, and Distraction-Free Mode.
https://t.me/InstaEclipse
https://t.me/instaEclipse_discussion
https://t.me/+UCGw09fMMQExNGZk
https://github.com/Xposed-Modules-Repo/ps.reso.instaeclipse
https://github.com/ReSo7200/InstaEclipse - MagiskAdBlockingModule: Magisk Module to block ads on Android.
https://github.com/pantsufan/Magisk-Ad-Blocking-Module - AdClose: An Xposed module to prevent in-app advertising SDK initialization. Block the app's online ad requests. Allow screenshots and screen recordings to be taken freely in the app. Remove in-app VPN and system proxy detection. Used to disable sensor-based advertising jumps such as Shake. Removes general Root, Magisk and Xposed framework detection within the app.
https://github.com/Xposed-Modules-Repo/com.close.hook.ads
https://github.com/zjyzip/AdClose
https://t.me/AdClose - AdAway: A free and open source ad blocker for Android.
https://github.com/AdAway/AdAway - Cubic-AdBlock: A simple AdBlock module based in /etc/hosts.
https://github.com/Vaz15k/Cubic-AdBlock - MagicalProtection: Magisk-only completely systemless adblocking.
https://github.com/programminghoch10/MagicalProtection - NetGuard: Provides simple and advanced ways to block access to the internet - no root required. Apps and addresses can individually be allowed or denied access to your Wi-Fi and/or mobile connection.
https://www.netguard.me
https://github.com/M66B/NetGuard
https://xdaforums.com/t/closed-app-6-0-netguard-no-root-firewall.3233012/ - DNSNet: A DNS-based host blocker for Android.
https://github.com/t895/DNSNet - Net-Switch: A Magisk module to isolate apps from accessing the internet on your Android device. This tool gives you complete control over which apps can send or receive data, improving security, privacy, and saving bandwidth.
https://github.com/Rem01Gaming/net-switch - Bind Hosts: Systemless hosts for APatch, KernelSU and Magisk. Fully standalone, self-updating.
https://github.com/bindhosts/bindhosts - Hosts Redirect: Let netd read hosts file from /data/adb/hostsredirect/hosts.
https://github.com/aviraxp/ZN-hostsredirect - Private DNS Android: A quick settings tile to switch your private dns provider. Supports any number of providers. Makes it easy to turn adblocking dns servers on or off with just a single tap.
https://github.com/karasevm/PrivateDNSAndroid - I am not a developer: Hide development mode, USB debugging mode and wireless debugging mode.
https://github.com/xfqwdsj/IAmNotADeveloper
https://github.com/Xposed-Modules-Repo/xyz.xfqlittlefan.notdeveloper - NoVPNDetect: An Xposed module prevent some apps detect your phone connected to VPN.
https://github.com/Xposed-Modules-Repo/me.hoshino.novpndetect
https://bitbucket.org/yuri-project/novpndetect - DoNotTryAccessibility: An Xposed module prevent apps to detect accessibility/accessibilities settings.
https://github.com/Xposed-Modules-Repo/io.github.nitsuya.donottryaccessibility
https://github.com/Nitsuya/DoNotTryAccessibility - DisableFlagSecure: Enabling screenshots in apps that normally wouldn't allow it, and disabling screenshot(Android 14+) & screen record(Android 15+) detection.
https://github.com/LSPosed/DisableFlagSecure
https://github.com/Xposed-Modules-Repo/io.github.lsposed.disableflagsecure - Flag Secure Patcher: Magisk module to patch services jars on device using dexlib2 to stop apps from preventing taking screenshots and block screenshot listeners that was introduced in A14.
https://github.com/j-hc/FlagSecurePatcher - Xposed Translate Text: Auto-translate app text using Local Cache first, then Gemini API, with fallback to Free Google API.
https://github.com/tianci-sh/XPTranslateText - KnoxPatch: LSPosed module to get Samsung apps/features working again in your rooted Galaxy device.
https://github.com/salvogiangri/KnoxPatch
https://github.com/Xposed-Modules-Repo/io.mesalabs.knoxpatch - NeoBackup: A modern backup manager for Android.
https://github.com/NeoApplications/Neo-Backup
https://t.me/neo_backup
https://xdaforums.com/t/app-8-0-open-source-root-neo-backup-apps-and-data-backup-tool-for-android.4167179/ - DataBackup: Free and open-source data backup application.
https://github.com/XayahSuSuSu/Android-DataBackup
https://t.me/databackupchannel
https://t.me/databackupchat - NekoBoxForAndroid: Sing-box / universal proxy toolchain for Android.
https://github.com/MatsuriDayo/NekoBoxForAndroid - Proxy Pin: Open source free capture HTTP(S) traffic software ProxyPin, supporting full platform systems.
https://github.com/wanghongenpin/proxypin - Trust User Certificates: Injects all user certificates into system certificates.
https://github.com/lupohan44/TrustUserCertificates - Termux: A terminal emulator application for Android OS extendible by variety of packages.
https://github.com/termux/termux-app - ReTerminal: A Simple Android Terminal Emulator. A sleek, Material 3-inspired terminal emulator designed as a modern alternative to the legacy Jackpal Terminal. Built on Termux's robust TerminalView.
https://github.com/RohitKushvaha01/ReTerminal - Sqlite3 Magisk Module: Provides a statically linked and stripped sqlite3 binary for arm64-v8a, armeabi-v7a, x86 and x86_64 devices.
https://github.com/rojenzaman/sqlite3-magisk-module - SQLite3 for Android: Provides an optimized version of SQLite3 for various Android architectures.
https://www.pling.com/p/2227258 - BCR - Basic Call Recorder: A simple Android call recording app for rooted devices or devices running custom firmware. Once enabled, it stays out of the way and automatically records incoming and outgoing calls in the background.
https://github.com/chenxiaolong/BCR - Guide: How to fix "You Need The Official WhatsApp" Error: A guide TESTED and CONFIRMED to bypass WhatsApp restriction at account registering.
https://t.me/BlankAssistance_Integrity/10 - WhatsApp Backup Google Driver Downloader Decryptor: A tool to download encrypted WhatsApp backups from Google Drive and decrypt them locallyv https://github.com/giacomoferretti/whatsapp-backup-downloader-decryptor
- Whatsapp Parser Toolset: A set of graphical forensic tools to analyze whatsapp from Android.
https://github.com/B16f00t/whapa - MagiskHluda: Run a more undetectable frida server on boot using Magisk.
https://github.com/Exo1i/MagiskHluda - MagiskFrida: Run frida-server on boot with Magisk, always up-to-date.
https://github.com/ViRb3/magisk-frida - Florida: Basic anti-detection frida-server.
https://github.com/Ylarod/Florida - QtScrcpy: Supports displaying and controlling Android devices via USB or over network. It does NOT require root privileges.
https://github.com/barry-ran/QtScrcpy - Infamick Script: A powerful system utility script for rooted Android devices. It provides easy access to various system information and settings, making it an essential tool for all users.
https://github.com/Infamousmick/Infamick-script - APKEditor: Powerful android apk editor - aapt/aapt2 independent.
https://github.com/REAndroid/APKEditor - APK-Explorer-Editor: An open-source tool to explore the contents of an installed APK!
https://github.com/apk-editor/APK-Explorer-Editor - (Deprecated) XPrivacyLua: Successor of XPrivacy. Revoking Android permissions from apps often let apps crash or malfunction. XPrivacyLua solves this by feeding apps fake data instead of real data.
https://xdaforums.com/t/discussion-lsposed-unofficial-xprivacylua-android-privacy-manager.4533999/
https://xdaforums.com/t/closed-app-xposed-6-0-xprivacylua-android-privacy-manager-unsupported.3730663/
https://github.com/Xposed-Modules-Repo/eu.faircode.xlua - (Deprecated) XPrivacyLuaPro: Pro companion app for XPrivacyLua.
https://xdaforums.com/t/closed-app-xposed-6-0-xprivacylua-pro-companion-app.3743040/
https://bitbucket.org/M66B/xlua-companion/downloads/ - (Deprecated) Magisk Hide: Natively blocks root usage and detection.
https://xdaforums.com/apps/magisk/official-magisk-v7-universal-systemless-t3473445
https://github.com/topjohnwu/Magisk - (Deprecated) Riru - Enhanced mode for Magisk Hide: Enable Enhanced mode for Magisk Hide. Allow Magisk Hide to handle isolated processes.
https://github.com/vvb2060/riru-unshare - (Deprecated) Riru - Momo Hider: This module tries to make "Magisk Hide" more hidden.
https://github.com/canyie/Riru-MomoHider - (Deprecated) Universal SafetyNet Fix: Magisk module to work around Google's SafetyNet and Play Integrity attestation.
https://xdaforums.com/t/magisk-module-universal-safetynet-fix-2-4-0.4217823/
https://github.com/kdrag0n/safetynet-fix - (Deprecated) RootCloak2: Blocks the use and detection of root and also blocks the use of other commands that can be customized.
https://xdaforums.com/t/mod-xposed-4-0-rootcloak-completely-hide-root-from-specific-apps-2014-01-14.2574647/
https://mattj.io/rootcloak/
https://github.com/devadvance/rootcloak - (Deprecated) Device Emulator: Xposed module for changing (MASKING) the various IDs in the phone.
https://deviceemulator.github.io/app - (Deprecated) XPrivacy: Prevent applications from leaking privacy-sensitive data by restricting the categories of data an application can access. XPrivacy feeds applications fake data or no data at all.
https://xdaforums.com/t/closed-xprivacy-the-ultimate-yet-easy-to-use-privacy-manager.2320783/
https://github.com/M66B/XPrivacy - (Deprecated) Xposed: Xposed is a framework that allows developers to apply modules to the Read-Only Memory (ROM) of Android for the purpose of modifying the app's behavior or creating a modified app.
https://xdaforums.com/t/official-xposed-for-lollipop-marshmallow-nougat-oreo-v90-beta3-2018-01-29.3034811/
https://xdaforums.com/t/xposed-general-info-versions-changelog.2714053/
https://github.com/rovo89?tab=repositories&q=xposed - (Deprecated) Mdg Wa: An Xposed Module to customize and enable privacy on WhatsApp.
https://github.com/ItsMadruga/MdgWa - (Deprecated) Kitsune Mask (Magisk Delta): A fork of Magisk.
https://github.com/KitsuneMagisk/Magisk
https://github.com/HuskyDG/magisk-files
https://xdaforums.com/t/discussion-kitsune-mask-another-unofficial-mask-of-magisk.4460555/
- RootBeer Sample: https://github.com/scottyab/rootbeer
- RootbeerFresh: https://github.com/kimchangyoun/rootbeerFresh
- Native Root Checker: https://github.com/DimaKoz/meat-grinder
- PiracyChecker https://github.com/javiersantos/PiracyChecker
- Cordova Jailbreak/Root Detection Plugin https://github.com/WuglyakBolgoink/cordova-plugin-iroot
- Android 4.4.2: SDK 19
- Android 4.4.4: SDK 19
- Android 5.0.2: SDK 21
- Android 5.1.1: SDK 22
- Android 6.0: SDK 23
- Android 7.0: SDK 24
- Android 7.1.1: SDK 25
- Android 7.1.2: SDK 25
- Android 8.0.0: SDK 26
- Android 8.1.0: SDK 27
- Android 9.0: SDK 28
- Android 10.0: SDK 29
- Android 11.0: SDK 30
- Android 12.0: SDK 31
Use native detectors. Like:
- TamJiGi: https://t.me/rormzhstjxm
- Holmes: https://t.me/app_process64
- Native Test: https://t.me/qianqianzhuang
- Native Detector: https://t.me/rootdetector
- Hunter: https://t.me/Zhenxi233
- Momo: https://t.me/magiskalpha
- Securify: https://github.com/RabehX/Securify/releases
- Memory Detector: https://github.com/reveny/detection/blob/main/MemoryDetector_2.1.0.apk
- Env Checks: https://play.google.com/store/apps/details?id=com.dexprotector.detector.envchecks
- KeyAttestation by vvb2060: https://github.com/vvb2060/KeyAttestation
- KeyAttestation by chiteroman: https://github.com/chiteroman/KeyAttestation
- Telegram: VD_Priv8
- E-mail: vd.priv8 @ pm.me
- XDA-Developers: VD171 https://xdaforums.com/m/vd171.4699873/
- Use and distribute as you want and as you wish.
- https://github.com/VD171/VD-Infos
- https://xdaforums.com/t/VD-Infos.4097379/
- Mirror: https://priv8.in/VD_Infos.apk
- Mirror: https://priv8.ru/VD_Infos.apk
- AkaBlank517: https://t.me/AkaBlank517
- rovo89: https://xdaforums.com/m/rovo89.4419114/
- rovo89: https://github.com/rovo89
- re-zero001: https://github.com/re-zero001
- pumPCin: https://github.com/pumPCin
- mywalkb: https://github.com/mywalkb
- CMDQ8575: https://github.com/CMDQ8575
- ObbedCode: https://xdaforums.com/m/obbedcode.12793605/
- ObbedCode: https://github.com/0bbedCode
- zhipingne: https://xdaforums.com/m/zhipingne.9027367/
- ikws4: https://github.com/ikws4
- M66B: https://xdaforums.com/m/m66b.2799345/
- M66B: https://github.com/M66B
- Fif_: https://xdaforums.com/m/fif_.5297163/
- Fif_: https://github.com/F-i-f
- AndroidX: https://xdaforums.com/m/androidx.7762470/
- AndroidX: https://github.com/Android1500
- Unique Solution: https://deviceemulator.github.io/app
- BytesReverser: https://xdaforums.com/m/bytesreverser.8062804/
- pyshivam: https://xdaforums.com/m/pyshivam.9833141/
- pyshivam: https://github.com/pyshivam
- scottyab: https://xdaforums.com/m/scottyab.2530687/
- scottyab: https://github.com/scottyab
- topjohnwu: https://xdaforums.com/m/topjohnwu.4470081/
- topjohnwu: https://github.com/topjohnwu
- devadvance: https://xdaforums.com/m/devadvance.2804938/
- devadvance: https://github.com/devadvance
- hikaritenchi: https://xdaforums.com/m/hikaritenchi.3514987/
- hikaritenchi: https://github.com/hikaritenchi
- DimaKoz: https://github.com/DimaKoz
- kimchangyoun: https://github.com/KimChangYoun
- javiersantos: https://github.com/javiersantos
- WuglyakBolgoink: https://github.com/WuglyakBolgoink
- vvb2060: https://github.com/vvb2060
- canyie: https://github.com/canyie
- yujincheng08: https://github.com/yujincheng08
- Dr-TSNG: https://github.com/Dr-TSNG
- 5ec1cff: https://github.com/5ec1cff
- 5ec1cff: https://t.me/a13e300
- Admirepowered: https://github.com/Admirepowered
- aviraxp: https://github.com/aviraxp
- bmax121: https://github.com/bmax121
- changhuapeng: https://github.com/changhuapeng
- changhuapeng: https://xdaforums.com/m/changhuapeng.12770876/
- chiteroman: https://github.com/chiteroman
- chiteroman: https://xdaforums.com/m/chiteroman.10277887/
- Crazyphil: https://github.com/Crazyphil
- daboynb: https://github.com/daboynb
- HuskyDG: https://github.com/HuskyDG
- HuskyDG: https://xdaforums.com/m/huskydg.11455139/
- JingMatrix: https://github.com/JingMatrix
- kdrag0n: https://github.com/kdrag0n
- kdrag0n: https://xdaforums.com/m/kdrag0n.7291478/
- osm0sis: https://github.com/osm0sis
- osm0sis: https://xdaforums.com/m/osm0sis.4544860/
- PerformanC: https://github.com/PerformanC
- snake-4: https://github.com/snake-4
- snake-4: https://xdaforums.com/m/snake-4.12839217/
- tiann: https://github.com/tiann
- tomyan112: https://xdaforums.com/m/tomyan112.5993032/
- x1337cn: https://github.com/x1337cn
- x1337cn: https://xdaforums.com/m/x1337cn.10497543/
- N-X-T: https://github.com/N-X-T
- tryigit: https://github.com/tryigit
- xfqwdsj: https://github.com/xfqwdsj
- RabehX: https://github.com/RabehX
- Reveny: https://github.com/Reveny
- Dev4Mod: https://github.com/Dev4Mod
- ItsMadruga: https://github.com/ItsMadruga
- zjyzip: https://github.com/zjyzip
- ReSo7200: https://github.com/ReSo7200
- nedorazrab0: https://github.com/nedorazrab0
- t895: https://github.com/t895
- Nitsuya: https://github.com/Nitsuya
- XayahSuSuSu: https://github.com/XayahSuSuSu
- pantsufan: https://github.com/pantsufan
- j-hc: https://github.com/j-hc
- DavidBerdik: https://github.com/DavidBerdik
- MatsuriDayo: https://github.com/MatsuriDayo
- Rem01Gaming: https://github.com/Rem01Gaming
- backslashxx: https://t.me/xfirstnamelastname
- backslashxx: https://github.com/backslashxx
- T3SL4 (0x11DFE): https://t.me/T3SL4
- 0x11DFE (T3SL4): https://github.com/0x11DFE
- frknkrc44: https://github.com/frknkrc44
- Zhenxi233: https://t.me/Zhenxi233
- haruue: https://github.com/haruue
- KOWX712: https://github.com/KOWX712
- lupohan44: https://github.com/lupohan44
- machiav3lli: https://github.com/machiav3lli
- nift4: https://github.com/nift4
- rifsxd: https://github.com/rifsxd
- RikkaW: https://github.com/RikkaW
- RohitKushvaha01: https://github.com/RohitKushvaha01
- saulhdev: https://github.com/saulhdev
- wanghongenpin: https://github.com/wanghongenpin
- XHUBERTH (HUBERTH): https://t.me/XHUBERTH
- rhythmcache: https://github.com/rhythmcache
- 1f2003d5 (pomelohan): https://t.me/real1f2003d5
- pomelohan (1f2003d5): https://github.com/pomelohan
- NVG-064: http://t.me/NVG064
- karasevm: https://github.com/karasevm
- chenxiaolong: https://github.com/chenxiaolong
- Vaz15k: https://github.com/Vaz15k
- rojenzaman: https://github.com/rojenzaman
- ShirkNeko: https://github.com/ShirkNeko
- ravindu644: https://github.com/ravindu644
- Astoritin: https://github.com/Astoritin
- mengshouer: https://github.com/mengshouer
- programminghoch10: https://github.com/programminghoch10
- karasevm: https://github.com/karasevm
- salvogiangri: https://github.com/salvogiangri
- giacomoferretti: https://github.com/giacomoferretti
- B16f00t: https://github.com/B16f00t
- Exo1i: https://github.com/Exo1i
- ViRb3: https://github.com/ViRb3
- Ylarod: https://github.com/Ylarod
- barry-ran: https://github.com/barry-ran
- Infamousmick: https://github.com/Infamousmick