BootloaderSpoofer icon indicating copy to clipboard operation
BootloaderSpoofer copied to clipboard

Spoof locked bootloader on local attestations

Results 11 BootloaderSpoofer issues
Sort by recently updated
recently updated
newest added

I'm using the latest v3.8. Before using it, momo only shows that the bootloader is unlocked. After using bootloader Spoofer, momo shows "zygote injected" can you please advise me how...

It appears the app now checks for bootloader status to be able to go online. Hooking with 3.8 does not help with this unfortunately

Now after cib latest update app not spoofing bootloader even if on key attestation says bootloader unlocked Iam on los 21 and pass paly integrity with your play integrity fix...

Hi! Thanks for this great module! I have Android 9, but after passing the test in KeyAttestation it shows the version of Android 13. Apparently your certificate is from this...

Hi am hooking this module to an apk i developed, but after every two hour I get global reference table overflow. java_vm_ext.cc:675] 50806 of JmdvIzdiWSoBx.zoLXHeXy.XC_MethodReplacement$1 (1 unique instances)

There are problems with client detection, such as memory crc detection. I hope I can do it in system_server. Do you have good advice?

Hi This module is working good if I unchecked app from magisk deny list So I have to choose add the app to deny list or bootloader spoof But I...

![Screenshot_20240709-132721_Key Attestation](https://github.com/chiteroman/BootloaderSpoofer/assets/98078687/bc45a1d7-812a-4965-a7bd-d0cf2479c073) How to fix this? I am using Galaxy J7 2017 OneUI 1.1 Can't pass device integrity also.

Whenever i try to detect TEE broken it shows up ![Screenshot_20240628-225825_Native Detector](https://github.com/chiteroman/BootloaderSpoofer/assets/80171692/6810ca60-d8e7-4f46-b239-dfaa438a5814) But if I give superuser permission to native detector or any other app TEE is broken goes away...