Fix Suspect Mount Detected (root detection)

1) Use MemoryDetector & Native Root Detector to know which modules are mounted to the system.
2) Flash magical_overlayfs
3) Change (/data/adb/modules/magisk_overlayfs/mode.sh) to (OVERLAY_MODE=2)
4) Now comes the dynamically loading detected modules using overlayfs image, Edit your detected modules (/META-INF/com/google/android/update-binary) and add the following script before the exit.
5) Reflash the module and check MemoryDetector.
6) Do for all detected/mounted modules.
OVERLAY_IMAGE_EXTRA=0     # number of kb need to be added to overlay.img
OVERLAY_IMAGE_SHRINK=true # shrink overlay.img or not?

# Only use OverlayFS if Magisk_OverlayFS is installed
if [ -f "/data/adb/modules/magisk_overlayfs/util_functions.sh" ] && \
/data/adb/modules/magisk_overlayfs/overlayfs_system --test; then
ui_print "- Add support for overlayfs"
. /data/adb/modules/magisk_overlayfs/util_functions.sh
support_overlayfs && rm -rf "$MODPATH"/system
fi


Fix Revanced mount detection:
1) Download & Flash Zygisk Proc Injection
2) Download YT Revanced Inject
3) Download & Install stock YT matching the inject version.
4) Flash YT Revanced Injection module.
5) Reboot and check if detected now.

How to update YT Revanced?
1) Change the module.prop (version=) in the Injector module so it matches your YT version.
2) Replace revanced.apk within your new Revanced APK within YT Injector module.
3) Installed version must be stock and match revanced.apk version.
4) Flash YT Injector and enjoy.

Notes:
YT Revanced Injector could in theory be used and modified to work with other Revanced mods.
If you use Revancify execute it with the parameter -n (rootless) to build the APK and not install it automatically.
If you still have the suspicious mount detected it must mean that your /data partition type is not f2fs. (su -c stat -f -c %T /data)

Credit to HuskyDG and all the people in his group who help and share knowledge.
πŸ‘41πŸ‘Ž25❀16😱6❀‍πŸ”₯1
Fix init.rc/ART and Recovery/Magisk detections

1) Search for (/system/addon.d) and rename it.
2) Search for (/sdcard/TWRP) and rename it (Or your recovery name).
3) Search for (/vendor/bin/install-recovery.sh) and (/system/bin/install-recovery.sh) and rename it.

Notes:
Before dirty updating your ROM rename those files and folders back to the original state.
Init.rc might also be due to (/vendor/etc/init) which are prebuilt into your ROM by default.

Credit to HuskyDG and all the people in his group who help and share knowledge.
❀43πŸ‘Ž29πŸ‘15
Updated the build.prop project so that the OTA Downloader gets the right version, Also some other changes have been done so it works on Termux for Android. (Still ongoing some fixes)
πŸ‘Ž34❀10πŸ”₯3
Husky.A14.20231205.zip
3.8 KB
Pixel 8 Pro - Husky
Security Patch: 2023-12-05
ID: UQ1A.231205.015
πŸ‘Ž40❀‍πŸ”₯18πŸ†5πŸ‘Œ3πŸ‘2
Raven.A14.20231205.zip
3.8 KB
Pixel 6 Pro - Raven
Security Patch: 2023-12-05
ID: UQ1A.231205.015
πŸ‘Ž39πŸ‘5😱5
Redfin.A14.20231105.zip
3.8 KB
Pixel 5 - Redfin
Security Patch: 2023-11-05
ID: UP1A.231105.001
πŸ‘Ž36πŸ‘13❀‍πŸ”₯1
Cheetah.A14.20231205.zip
3.8 KB
Pixel 7 Pro - Cheetah
Security Patch: 2023-12-05
ID: UQ1A.231205.015
πŸ‘Ž39πŸ‘9❀‍πŸ”₯2❀2πŸ‘Œ1
Shiba.A14.20231205.zip
3.8 KB
Pixel 8 - Shiba
Security Patch: 2023-12-05
ID: UQ1A.231205.015
πŸ‘Ž42🀩10πŸ‘3❀1πŸ‘Œ1
The detectability of LSPosed by third-party apps raises privacy and security concerns, reflecting unprofessionalism. This issue arises as developers created a native detection project, removed it later, and witnessed the emergence of forks of the original project. Unfortunately, my attempts to address this matter led to expulsion and a ban from their group. Advocating against this unfair and unprofessional practice is crucial, emphasizing its implications for privacy and security. (Kindly refrain from using vulgar language.)

Anti Magisk & Xposed by LSPosed dev canyie (Translated by HuskyDG)
XposedDetector

John Wu rebbutal: 1. 2. 3. 4.
MlgmXyysd rebbutal: 1. 2.

SilmVXposed & SPatch describe how LSPosed killed its upstream project

They even go to other peoples repositories to spam in order to promote their projects https://github.com/MlgmXyysd/kernel-assisted-superuser/pull/1

There are also countless Xposed modules that vanished from the WWW as they don't want it to exist.
(The module in question)
πŸ‘Ž127😱89πŸ‘26🫑20😒5
Happy new year ❀️
πŸ‘Ž91❀77πŸŽ‰19πŸ‘7❀‍πŸ”₯6
Happy XMAS to my Orthodox followers ❀️
πŸ‘Ž160❀42πŸ‘7🀯5🀩3
Raven.A14.20240105.zip
3.8 KB
Pixel 6 Pro - Raven
Security Patch: 2024-01-05
ID: UQ1A.240105.002
πŸ‘Ž155πŸ‘11πŸ”₯3
Redfin.A14.20231105.zip
3.8 KB
Pixel 5 - Redfin
Security Patch: 2023-11-05
ID: UP1A.231105.001
πŸ‘Ž165πŸ‘8⚑5
Husky.A14.20240105.zip
3.8 KB
Pixel 8 Pro - Husky
Security Patch: 2024-01-05
ID: UQ1A.240105.004
πŸ‘Ž185🫑29πŸ‘7😒1πŸ‘Œ1
Shiba.A14.20240105.zip
3.8 KB
Pixel 8 - Shiba
Security Patch: 2024-01-05
ID: UQ1A.240105.004
πŸ‘Ž206πŸ‘7❀‍πŸ”₯6❀3
Cheetah.A14.20240105.zip
3.8 KB
Pixel 7 Pro - Cheetah
Security Patch: 2024-01-05
ID: UQ1A.240105.004
πŸ‘Ž297πŸ‘17❀‍πŸ”₯9😁3🌚3
πŸ‘€55πŸ—Ώ15😁8πŸ‘6πŸ‘Œ6
❀‍πŸ”₯72πŸ‘€15❀6πŸ‘5😁5