Guide for adding MicroG support to Roms from KitKat and up:
https://github.com/Thespartann/android_frameworks_base_microG/blob/master/README.md
Includes all of the patch files and also the patched frameworks base. (Kitkat-Lollipop-Marshmallow-Nougat-Oreo-Pie)
π‘ @NoGoolag
#sspatch #signature #spoofing #patch #microg #build #compile
https://github.com/Thespartann/android_frameworks_base_microG/blob/master/README.md
Includes all of the patch files and also the patched frameworks base. (Kitkat-Lollipop-Marshmallow-Nougat-Oreo-Pie)
π‘ @NoGoolag
#sspatch #signature #spoofing #patch #microg #build #compile
GitHub
android_frameworks_base_microG/README.md at master Β· Thespartann/android_frameworks_base_microG
Contribute to Thespartann/android_frameworks_base_microG development by creating an account on GitHub.
Fix Signature Spoofing Support
Solution when "Play Store (Phonesky) has correct signature" is not checked,
run these 2 commands in termux app or other terminal app:
For android 9 and lower you can do it this way:
Go to settings
apps
app permission
signature spoofing
3 dot menu
show system apps
give permission to fakestore.
How to give Fake Store permissions on the second user. Not possible the usual way with terminal. So in
Add the line:
Then reboot
π‘ @NoGoolag
#fsss #fix #signature #spoofing #problems #issues #playstore #phonesky
Solution when "Play Store (Phonesky) has correct signature" is not checked,
run these 2 commands in termux app or other terminal app:
su
pm grant com.android.vending android.permission.FAKE_PACKAGE_SIGNATURE
For android 9 and lower you can do it this way:
Go to settings
apps
app permission
signature spoofing
3 dot menu
show system apps
give permission to fakestore.
How to give Fake Store permissions on the second user. Not possible the usual way with terminal. So in
/data/system/users/10/runtime-permissions.xml
Add the line:
<pkg name="com.android.vending">
<item name="android.permission.FAKE_PACKAGE_SIGNATURE" granted="true" flags="0" />
</pkg>
Then reboot
π‘ @NoGoolag
#fsss #fix #signature #spoofing #problems #issues #playstore #phonesky
Signature Spoofing for Android 11
Guide by bluede-v Will
First of all Flash your ROM and Magisk (you need to download the latest version to get Magisk working on Android 11)
Click on Build number (7x) to enable Developer Options
After that enable ADB-Debugging and Root-ADB-Debugging in your ROM in case of LineageOS go to Setting -> System -> Developer Options
So Lets go this is the more complicated part. but also really easy if you done it once.
I'm using Debian Linux but it should be possible on every OS. In Windows use the Linux Subsystem.
You need to have ADB installed on your System tho.
ADB link: https://adbdownload.com
First of all you need to download this 2 Files:
https://gitlab.com/oF2pks/haystack/-/blob/11-attempt/spoof_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO
https://github.com/microg/GmsCore/files/5652857/microG_AVDx86api30_magiskMaRViN.zip
Rename "spoof\_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO" to "spoof\_AVDapi30.zip"
Next Download this zip: https://gitlab.com/oF2pks/haystack/-/archive/11-attempt/haystack-11-attempt.zip
Also download this jar file: https://github.com/DexPatcher/dexpatcher-tool/releases/download/v1.8.0-beta1/dexpatcher-1.8.0-beta1.jar
So now unzip the haystack-11-attempt.zip and put the dexpatcher.jar file into to Folder.
This part I use Bash shell in Linux.
Bash:
adb pull /system/framework/services.jar
java -jar dexpatcher-1.8.0-beta1.jar -a 11 -M -v -d -o ./ services.jar 11-hook-services.jar.dex 11core-services.jar.dex
(After that Command you should have 4 files all named classes*.dex)
Bash:
mkdir repack
zip -j repack/services.jar classes*.dex
After that you should have a new services.jar in your repack Folder.
Now You need to open the spoof\_AVDapi30.zip go in /system/framework/ and delete the old services.jar and put your own file in. that's in your repack Folder.
Don't ruin the zip-format of the file tho because otherwise Magisk will cry while install.
After that put your spoof-AVDapi30.zip and your microG\_AVDx86api30\_magiskMaRViN.zip on your Phone and Flash via Magisk.
Reboot and you hopefully have Signature spoofig working. If you run in any Problems check out the GitHub Links here. there will be comments that maybe will help.
https://forum.xda-developers.com/t/signature-spoofing-on-unsuported-android-11-r-roms.4214143/
#sigspoof #signature #spoofing #android11 #a11 #r
Guide by bluede-v Will
First of all Flash your ROM and Magisk (you need to download the latest version to get Magisk working on Android 11)
Click on Build number (7x) to enable Developer Options
After that enable ADB-Debugging and Root-ADB-Debugging in your ROM in case of LineageOS go to Setting -> System -> Developer Options
So Lets go this is the more complicated part. but also really easy if you done it once.
I'm using Debian Linux but it should be possible on every OS. In Windows use the Linux Subsystem.
You need to have ADB installed on your System tho.
ADB link: https://adbdownload.com
First of all you need to download this 2 Files:
https://gitlab.com/oF2pks/haystack/-/blob/11-attempt/spoof_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO
https://github.com/microg/GmsCore/files/5652857/microG_AVDx86api30_magiskMaRViN.zip
Rename "spoof\_AVDapi30.zip.ONLY'MAGISK&ANDROID-STUDIO" to "spoof\_AVDapi30.zip"
Next Download this zip: https://gitlab.com/oF2pks/haystack/-/archive/11-attempt/haystack-11-attempt.zip
Also download this jar file: https://github.com/DexPatcher/dexpatcher-tool/releases/download/v1.8.0-beta1/dexpatcher-1.8.0-beta1.jar
So now unzip the haystack-11-attempt.zip and put the dexpatcher.jar file into to Folder.
This part I use Bash shell in Linux.
Bash:
adb pull /system/framework/services.jar
java -jar dexpatcher-1.8.0-beta1.jar -a 11 -M -v -d -o ./ services.jar 11-hook-services.jar.dex 11core-services.jar.dex
(After that Command you should have 4 files all named classes*.dex)
Bash:
mkdir repack
zip -j repack/services.jar classes*.dex
After that you should have a new services.jar in your repack Folder.
Now You need to open the spoof\_AVDapi30.zip go in /system/framework/ and delete the old services.jar and put your own file in. that's in your repack Folder.
Don't ruin the zip-format of the file tho because otherwise Magisk will cry while install.
After that put your spoof-AVDapi30.zip and your microG\_AVDx86api30\_magiskMaRViN.zip on your Phone and Flash via Magisk.
Reboot and you hopefully have Signature spoofig working. If you run in any Problems check out the GitHub Links here. there will be comments that maybe will help.
https://forum.xda-developers.com/t/signature-spoofing-on-unsuported-android-11-r-roms.4214143/
#sigspoof #signature #spoofing #android11 #a11 #r