NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Live free!

πŸ“‘ @NoGoolag

FAQ:
http://t.me/NoGoolag/169

β˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

πŸ“‘ @Libreware

πŸ“‘ @TakeBackOurTech

🦊 @d3_works

πŸ“š @SaveAlexandria

πŸ’― % satire OSINT
Download Telegram
MicroG Setup Guide

MicroG is an open source alternative to Gapps, with which you are almost guaranteed to get:
-Better Bettery Life
-Privacy
-Better performance
over Gapps.

Google services that are supported by MicroG are detailed here:
https://github.com/microg/android_packages_apps_GmsCore/wiki/Implementation-Status


⬇️How to get MicroG:
-Get MicroG individual APKs and manually put them into system (and granting all permissions to all of them manually):
--Website:
https://microg.org/download.html
--FDroid repository:
https://microg.org/fdroid/repo

-Through any of the packs that install the whole microg package, this is the easiest way https://t.me/NoGoolag/182

⚠️NOTE: You need Signature Spoofing for MicroG to work properly. Check #sigspoof
https://forum.xda-developers.com/android/general/index-list-custom-roms-offering-t3557047


πŸ“–Steps to setup MicroG are:

1. Do a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.)

2. Install MicroG through your preferred medium.

3. Reboot to system.

4. Go to Settings > Accounts > Add Accounts > Google and login to your account (NOT REQUIRED)

5. Open app 'MicroG Settings' > Self-Check. If "System grants signature spoofing permission" isn't ticked, click on it and grant permission.

6. In MicroG settings, Go to "Google device registration", "Google Cloud Messaging", and "Google SafetyNet" and enable each of them.

7. Reboot.

8. In MicroG settings, go to UnifiedNLP settings, and enable everything in "Configure location backends" and "Configure address lookup backends".

9. Reboot.

Congrats! MicroG set up! You are now Google services free.

For Google Sync:
-Check https://t.me/NoGoolag/70

For accessing Play Store:
-Use Aurora which are open-source and directly access apps from play store
-Use a modded play store from any of the microg installers
https://t.me/NoGoolag/1792

To use a Google app:
-If a google app is not seeing your account, wipe its data and give it all permissions (not very privacy friendly, but you were the one who wanted to make them work). Then hope for the best.
-Open the app and it [should] see your account.

Troubleshooting:
Setup location like this https://t.me/NoGoolag/64

Report problems with the MicroG app here:
https://forum.xda-developers.com/android/apps-games/app-microg-gmscore-floss-play-services-t3217616/


🧩 The main components of MicroG are:

-GmsCore (com.google.android.gms)
--The stuffing of the package resides here. All the major code.

-GsfProxy (com.google.android.gsf)
--Enables GCM (Google cloud messaging, which is basically a notification system most apps use)

-FakeStore (com.android.vending)
--A placeholder for PlayStore
--NOT AN APP STORE
--Just to prevent poorly coded apps from crashing

-MapsAPIv1 (com.google.android.maps)
--To make older apps with maps work

-DroidGuard (org.microg.gms.droidguard)
--Optional
--Used to try to pass safetynet
--Has proprietary components, but sandboxed

-Various NLP backends
--Optional
--For getting network location (different from GPS location)
--check #backends


#microg #guide #foss
Guide from @nogoolag
NanoDroid

NanoDroid is a microG installer (by Setialpha) that can install MicroG either in system or systemlessly (as a Magisk module)

🌏Web:
https://nanolx.org/nanolx/nanodroid

πŸ“š RTFM:
https://gitlab.com/Nanolx/NanoDroid

πŸ“ Changelog:
https://gitlab.com/Nanolx/NanoDroid/blob/master/ChangeLog.md

πŸ—£ XDA:
https://forum.xda-developers.com/apps/magisk/module-nanodroid-5-0-20170405-microg-t3584928

πŸ“² F-Droid repo
http://nanolx.org/fdroid/repo
Link to add:
https://nanolx.org/fdroid/repo?fingerprint=862ED9F13A3981432BF86FE93D14596B381D75BE83A1D616E2D44A12654AD015

πŸ†š The full list of differences compared to upstream microG can be read here:
https://github.com/Nanolx/android_packages_apps_GmsCore#changes


Nanodroid zips:

♦️NanoDroid-*.zip
--This is the biggest zip and full of other foss apps.
--Flash either this or the MicroG zip.

♦️NanoDroid-microG-*.zip
--The real package. Contains MicroG stuff and patched Play Store.
--Flash either this or the full NanoDroid zip. This is recommended.

♦️NanoDroid-fdroid-*.zip
--Contains F-droid and its privileged extension. Optional.

♦️NanoDroid-patcher-*.zip
--Signature spoofing enabler.

♦️NanoDroid-setupwizard-*.zip
--Aroma setup wizard for MicroG nanodroid. Either use this, or default settings.

♦️NanoDroid-uninstaller-*.zip
--Self-explanatory.

(Note: * = latest version)


πŸ— Steps to Install NanoDroid are:

NOTE: Do this on a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.) Optionally, flash Magisk.
Make sure your ROM supports Signature Spoofing. Check #sigspoof

1. Flash NanoDroid-setupwizard-*.zip and configure your install.
2. Flash the NanoDroid-microG-*.zip (or NanoDroid-*.zip) and optionally NanoDroid-fdroid-*.zip. Note: If you have Magisk, no need to flash this again after future dirty flashes.
3. Setup MicroG using the microg #guide.

Report problems with NanoDroid here:
https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/


πŸ“‘ @NoGoolag
#nanodroid #microg #guide
Many recent roms that supported signature spoofing have this issue now with the latest December security patch by Google

You can try flashing nanodroid patcher to solve it for now

#dec #december #sigspoof #signature #spoofing
NanoDroid

NanoDroid is a microG installer (by Setialpha) that can install MicroG either in system or systemlessly (as a Magisk module)

🌏Web:
https://nanolx.org/nanolx/nanodroid

πŸ“š Guide:
https://gitlab.com/Nanolx/NanoDroid

πŸ“ Changelog:
https://gitlab.com/Nanolx/NanoDroid/blob/master/ChangeLog.md

Stable downloads:
https://downloads.nanolx.org/NanoDroid/Stable

Beta downloads:
https://downloads.nanolx.org/NanoDroid/Beta

πŸ—£ XDA:
https://forum.xda-developers.com/apps/magisk/module-nanodroid-5-0-20170405-microg-t3584928

πŸ“² F-Droid repo
http://nanolx.org/fdroid/repo
Link to add:
https://nanolx.org/fdroid/repo?fingerprint=862ED9F13A3981432BF86FE93D14596B381D75BE83A1D616E2D44A12654AD015

πŸ†š The full list of differences compared to upstream microG can be read here:
https://github.com/Nanolx/android_packages_apps_GmsCore#changes


Nanodroid zips:

♦️NanoDroid-*.zip
--This is the biggest zip and full of other foss apps, terminal utilities and the best Legend of Zelda ringtones and sounds.
--Flash either this or the MicroG zip.

♦️NanoDroid-microG-*.zip
--The real package. Contains MicroG stuff and patched Play Store.
--Flash either this or the full NanoDroid zip. This is recommended.

♦️NanoDroid-BromiteWebView-*.zip
--Contains the Bromite webview. Currently the easiest way to intall it.

♦️NanoDroid-fdroid-*.zip
--Contains F-droid and its privileged extension. The full zip already includes FDroid.

♦️NanoDroid-OsmAnd-*.zip
--Contains the OsmAnd maps application along with a contour lines plugin to be installed as system (not sure what good that will do)

♦️NanoDroid-patcher-*.zip
--Signature spoofing enabler.

♦️NanoDroid-setupwizard-*.zip
--Aroma setup wizard for MicroG nanodroid. Either use this, or default settings.

♦️NanoDroid-systest-*.zip
--If you face issues with NanoDroid installation, flash this and it will create logs which you can send to the dev.

♦️NanoDroid-uninstaller-*.zip
--Self-explanatory.

(Note: * = latest version)


πŸ— Steps to Install NanoDroid are:

NOTE: Do this on a clean flash of the ROM. That is, wipe Data, Cache and System, and flash your ROM again. (Otherwise you may have permission problems and battery drain.) Optionally, flash Magisk.
Make sure your ROM supports Signature Spoofing. Check #sigspoof

1. After installing your rom and TWRP, reboot before doing anything. This initalizes folders necessary for patching/installation
2. Flash NanoDroid-setupwizard-*.zip and configure your install.
3. If sig spoofing isn't included in your ROM or doesn't work, Flash the NanoDroid patcher. If you're on P, make sure you deodex first!
4. Flash either the NanoDroid-*.zip or NanoDroid-microG-*.zip.
5. Optionally, flash these zips: NanoDroid-BromiteWebView-*.zip, NanoDroid-fdroid-*.zip and Nanodroid-OsmAnd-*.zip.
6. Setup MicroG using the microg #guide.

Report problems with NanoDroid here:
https://forum.xda-developers.com/apps/magisk/module-nanomod-5-0-20170405-microg-t3584928/


πŸ“‘ @NoGoolag
#nanodroid #microg #guide
Warning about Smali Patcher issued in public interest

TLDR; don't use SmaliPatcher, use NanoDroid patcher, Qpatch or Haystack

Smali patcher was released a while ago, and it seemed to be a very useful tool (despite it being windows only) as it would automagically pull, deodex, patch and push sigspoof to your connected phone. Even more so since no other sigspoof patcher seems to support Q yet.

But a little research before I went to ask the "developer" to open source it revealed these posts in the thread:

- https://forum.xda-developers.com/showpost.php?p=78958124
-> f0mey (OP of thread) admitting that they don't know anything of the source code and probably don't even have access to it

- https://forum.xda-developers.com/showpost.php?p=80287799
- https://forum.xda-developers.com/showpost.php?p=80287989
- https://forum.xda-developers.com/showpost.php?p=80292041
-> A user complaining that the executable recieves incoming connections from arbitrary IPs, and f0mey nonchalantly saying that they have no idea what that is and it's probably nothing. Further down the thread, f0mey notes the IP seems to be from Russia, still confident that nothing is wrong.

Conclusion:
Still no proof that Smali Patcher does anything malicious, but a pretty big concern.
Also, its real origin is still unknown. Perhaps 4pda?


@NoGoolag
#smalipatcher #sigspoof #smali
patch.sh
3.8 KB
Signature Spoofing patching for Android Q

- All the credit to Darknecromonger for discovering this method -

Basically some tools (namely DexPatcher) have been updated that now allow us to patch Android Q for sigspoofing without using shady stuff like SmaliPatcher.

Setialpha knows about it already and it will probably be in the next ND patcher release.

Meanwhile, here's a handy little shell script to be run from a PC. It'll pull, patch and push a sigspoof patched services.jar by itself.

Prerequisites:
- A deodexed ROM
- A PC with java and adb installed

Instructions:
- Connect the device to your PC with a cable and authorise ADB
- Run patcher.sh

[Tested on Debian, but should be distro agnostic]

Troubleshooting:
- ADB can't access USB for your user? Search online how to fix it. Or you can run with sudo, but that's just bad practice


πŸ“‘ @NoGoolag
#sigspoof #q #patch #patcher
Signature Spoofing for Android 11
Guide by bluede-v Will

First of all Flash your ROM and Magisk (you need to download the latest version to get Magisk working on Android 11)

Click on Build number (7x) to enable Developer Options

After that enable ADB-Debugging and Root-ADB-Debugging in your ROM in case of LineageOS go to Setting -> System -> Developer Options

So Lets go this is the more complicated part. but also really easy if you done it once.

I'm using Debian Linux but it should be possible on every OS. In Windows use the Linux Subsystem.

You need to have ADB installed on your System tho.

ADB link: https://adbdownload.com

First of all you need to download this 2 Files:
https://gitlab.com/oF2pks/haystack/-/blob/11-attempt/spoof_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO

https://github.com/microg/GmsCore/files/5652857/microG_AVDx86api30_magiskMaRViN.zip

Rename "spoof\_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO" to "spoof\_AVDapi30.zip"

Next Download this zip: https://gitlab.com/oF2pks/haystack/-/archive/11-attempt/haystack-11-attempt.zip

Also download this jar file: https://github.com/DexPatcher/dexpatcher-tool/releases/download/v1.8.0-beta1/dexpatcher-1.8.0-beta1.jar

So now unzip the haystack-11-attempt.zip and put the dexpatcher.jar file into to Folder.

This part I use Bash shell in Linux.
Bash:
adb pull /system/framework/services.jar

java -jar dexpatcher-1.8.0-beta1.jar -a 11 -M -v -d -o ./ services.jar 11-hook-services.jar.dex 11core-services.jar.dex
(After that Command you should have 4 files all named classes*.dex)
Bash:
mkdir repack

zip -j repack/services.jar classes*.dex
After that you should have a new services.jar in your repack Folder.

Now You need to open the spoof\_AVDapi30.zip go in /system/framework/ and delete the old services.jar and put your own file in. that's in your repack Folder.

Don't ruin the zip-format of the file tho because otherwise Magisk will cry while install.

After that put your spoof-AVDapi30.zip and your microG\_AVDx86api30\_magiskMaRViN.zip on your Phone and Flash via Magisk.

Reboot and you hopefully have Signature spoofig working. If you run in any Problems check out the GitHub Links here. there will be comments that maybe will help.

https://forum.xda-developers.com/t/signature-spoofing-on-unsuported-android-11-r-roms.4214143/


#sigspoof #signature #spoofing #android11 #a11 #r