# TrickyStore **Repository Path**: dong_rong/TrickyStore ## Basic Information - **Project Name**: TrickyStore - **Description**: No description available - **Primary Language**: C++ - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2024-07-17 - **Last Updated**: 2024-07-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Tricky Store A trick of keystore. **Android 12 or above is required**. ## Usage 1. Flash this module and reboot. 2. Put keybox.xml to /data/adb/tricky_store/keybox.xml . 3. Put target packages to /data/adb/tricky_store/target.txt (Optional). 4. Enjoy! ## keybox.xml format: ```xml 1 -----BEGIN EC PRIVATE KEY----- ... -----END EC PRIVATE KEY----- ... -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- ... more certificates ... ``` ## Build Vars Spoofing > **Zygisk (or Zygisk Next) is needed for this feature to work.** If you can not pass strong integrity, you can try to enable build vars spoofing by creating a file `/data/adb/tricky_store/spoof_build_vars`. After doing that, TrickyStore will automatically generate an example config json inside `/data/adb/tricky_store/spoof_build_vars` on next reboot. Then you can manually edit your spoof config. Here is an example of spoof config: ```json { "manufacturer": "Google", "model": "Pixel", "fingerprint": "google/sailfish/sailfish:8.1.0/OPM1.171019.011/4448085:user/release-keys", "brand": "google", "product": "sailfish", "device": "sailfish", "release": "8.1.0", "id": "OPM1.171019.011", "incremental": "4448085", "security_patch": "2017-12-05", "type": "user", "tags": "release-keys" } ``` ## Support TEE broken devices TrickyStore will hack leaf certificate by default. On TEE broken devices, this will not work because we can't retrieve leaf certificate from TEE. You can add a `!` after package name to enable certificate generate support for this package. For example: ``` # target.txt # use leaf certificate hacking mode for KeyAttestation App io.github.vvb2060.keyattestation # use certificate generating mode for gms com.google.android.gms! ``` ## Known issue - App Attest Key is not supported. - StrongBox is not supported. ## Acknowledgement - [PlayIntegrityFix](https://github.com/chiteroman/PlayIntegrityFix) - [FrameworkPatch](https://github.com/chiteroman/FrameworkPatch) - [BootloaderSpoofer](https://github.com/chiteroman/BootloaderSpoofer) - [KeystoreInjection](https://github.com/aviraxp/Zygisk-KeystoreInjection) - [LSPosed](https://github.com/LSPosed/LSPosed) - [Glaze](https://github.com/stephenberry/glaze)