This repository contains a powerful Frida script designed to bypass root detection mechanisms in Android applications. By intercepting both native and Java-based checks, this script effectively hides the presence of root, enabling smooth testing and debugging on rooted devices.
- Native Function Interception: Blocks file access checks (
fopen
,access
,stat
,lstat
) for root-related files and paths. - Java Method Overrides: Hooks into Java methods (
File.exists
,File.length
) to prevent root detection at the application layer. - System Property Manipulation: Spoofs system properties (
ro.secure
,ro.debuggable
, etc.) to simulate a non-rooted environment. - Package Detection Evasion: Masks root-related applications like Magisk or SuperSU by overriding package manager queries.
- Command Blocking: Prevents execution of shell commands (
su
,magisk
, etc.) commonly used to check root access. - Comprehensive Root Indicators: Includes an extensive list of paths, packages, and commands related to root detection.
- Install Frida on your system. Follow the Frida Installation Guide for details.
- Deploy the Frida server on your Android device:
- Download the appropriate Frida server binary from Frida Releases.
- Push the binary to your device and grant execute permissions:
adb push frida-server /data/local/tmp/ adb shell "chmod +x /data/local/tmp/frida-server"
- Start the Frida server:
adb shell "/data/local/tmp/frida-server &"
- Load the script into the target application using Frida:
frida -U -f com.example.targetapp -l root.js --no-pause