Skip to content

rushiiMachine/XSpoofSignatures

Repository files navigation

XSpoofSignatures

Xposed module to spoof package signatures.

Features

  • Supports Android >= 1.5 (Cupcake)
  • Compatible with the standardized spoofing mechanic (microG)
  • Allow any package to spoof their signature through manifest properties
    • Allow bypassing GMS checks
  • Spoofing gated behind a permission

Install

  1. Use Magisk to root your device
  2. Enable Zygisk
  3. Install LSPosed or the updated LSPosed fork
  4. Install XSpoofSignatures from here
  5. Enable it in LSPosed
  6. Verify that signature spoofing works via Signature Spoofing Checker
  7. You can now use apps that require signature spoofing (like microG)

Usage (developers)

XSpoofSignatures supports two methods of spoofing:

  • Sole signer [DEFAULT]: spoof to be the only signer on a package
  • First signer: spoof to be the first signer on a package (multi signers)
    • Note: this does not work for all signer checks such as GMS

Each package must declare and request (at runtime) the android.permission.FAKE_PACKAGE_SIGNATURE permission.
If the permission is not granted then no spoofing will occur.

This module will check for two <meta-data> tags for each package that wants to spoof it's own signature:

  • fake-signature -> The certificate fingerprint in hex
  • fake-signature-only (optional, default true) -> Refer to "Sole signer" above

To see an example usage of signature spoofing, see sigspoof-checker.

About

Xposed module to spoof package signatures.

Resources

License

Stars

Watchers

Forks

Sponsor this project

 

Packages

No packages published

Languages