Install LSPosed with Magisk

0 21
PrefaceInstallation of LSP framework (LSP framework is the one that runs xp modu...

Preface

Installation of LSP framework (LSP framework is the one that runs xp modules, Magisk is the one that runs LSP)

Magisk V24 and above versions can use Zygisk, V23 version does not need Zygisk but detection is not as good as V24 version

One, activate LSPosed

The LSPosed manager.apk I downloaded needs Zygisk activation
Click on the settings at the top right corner
image.png
Enable Zygisk
image.png
image.png

Two, comply with the sorting list & configure the exclusion list

Install LSPosed with Magisk

image.png

If you don't want other APPs to detect that面具magisk is installed locally, check it
image.png

Three, install LSPosed package through module

image.png
Install from local
image.png
image.png
Put the LSPosed-v1.8.3-6552-zygisk-release.zip package into the shared folder
image.png
image.png

Open the file at the top left and click Amaze
image.png
image.png
image.png
image.png

Four, successfully install & restart the phone

image.png
image.png

Five, install LSPosed icon

After restarting, there is no LSPosed icon, but it has been successfully installed, and we can choose to install it.
image.png
image.png
image.png

See that our LSPosed is in the active state
image.png

Six, test effect

1. Install LSPosed module -- application disguise

Install module -- application disguise, used to enrich the LSPosed module function
image.png
image.png

2. Install test APP

Install the device information viewer.apk again for testing later
image.png
image.png

3. Start module - application disguise

Go back to the LSPosed module and enable the application disguise module
image.png
image.png

4. Record original data information

image.png
image.png

Type of device information
image.png
image.png
Record the current device information
image.png

5. Application disguise -- modify information

image.png
image.png
image.png
Definitely answer the questions first!!!
image.png
Find the APP
image.png
First clear the application data, there will be operations such as permissions in the middle, choose to agree, and then choose one-click random.
image.png
image.png

Save information
image.png

6. Modification successful

Reopen the APP to get device information for comparison, and successfully see that our device information is completely different from before
image.png

你可能想看:

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

In-depth Analysis: Mining Trojan Analysis and Emergency Response Disposal Under a Complete Attack Chain

How to use truffleHog to search for high-entropy strings and sensitive data in Git repositories to protect the security of code repositories

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

Host external connection investigation for enterprise emergency response, with self-made investigation script

Hidden dangers in the digital age: how to deal with API security risks

Finally, choose the target source, establish a talent skill tree, which is convenient for accurately and quickly finding resumes

最后修改时间:
admin
上一篇 2025年03月30日 08:50
下一篇 2025年03月30日 09:13

评论已关闭