patch.sh
3.8 KB
Signature Spoofing patching for Android Q
- All the credit to Darknecromonger for discovering this method -
Basically some tools (namely DexPatcher) have been updated that now allow us to patch Android Q for sigspoofing without using shady stuff like SmaliPatcher.
Setialpha knows about it already and it will probably be in the next ND patcher release.
Meanwhile, here's a handy little shell script to be run from a PC. It'll pull, patch and push a sigspoof patched services.jar by itself.
Prerequisites:
- A deodexed ROM
- A PC with java and adb installed
Instructions:
- Connect the device to your PC with a cable and authorise ADB
- Run patcher.sh
[Tested on Debian, but should be distro agnostic]
Troubleshooting:
- ADB can't access USB for your user? Search online how to fix it. Or you can run with sudo, but that's just bad practice
π‘ @NoGoolag
#sigspoof #q #patch #patcher
- All the credit to Darknecromonger for discovering this method -
Basically some tools (namely DexPatcher) have been updated that now allow us to patch Android Q for sigspoofing without using shady stuff like SmaliPatcher.
Setialpha knows about it already and it will probably be in the next ND patcher release.
Meanwhile, here's a handy little shell script to be run from a PC. It'll pull, patch and push a sigspoof patched services.jar by itself.
Prerequisites:
- A deodexed ROM
- A PC with java and adb installed
Instructions:
- Connect the device to your PC with a cable and authorise ADB
- Run patcher.sh
[Tested on Debian, but should be distro agnostic]
Troubleshooting:
- ADB can't access USB for your user? Search online how to fix it. Or you can run with sudo, but that's just bad practice
π‘ @NoGoolag
#sigspoof #q #patch #patcher