What this does
This will allow you to patch the Android system and inject features without needing to recompile the OS or install Xposed.
Notably, it is made to inject support for signature spoofing into the system so it can spoof Android app signatures (useful for microG).
Windows, Linux, macOS (OS X) and Android.
It doesn't require root on the OS where you run it but it require root on the device you want to patch.
Python, 7-Zip, Java and ADB.
Dependencies setup on Linux
sudo add-apt-repository universe
sudo apt-get update
sudo apt-get install python3 p7zip-full default-jre android-tools-adb
brew install python3
brew install p7zip
brew cask install java
brew cask install android-platform-tools
How to use
- Make sure
Developer optionsis enabled. This is hidden by default since sometime in Android 4.x, you can show it by going to
About phoneand tapping on the
Build number7 times in succession.
- In the developer settings, find the setting for
Android debuggingand enable it.
- Find the setting for
Root accessand make sure ADB has root access.
- Connect your device via USB.
- Now, on the computer, run
- Select the option 1 to allow the patcher to do everything automatically.
- Reboot the device.
You can run this patcher also when the device is in Android's recovery.
You will need to reboot for Android to detect that you've installed a new framework and so for Dalvik/ART to re-optimise all the apps on the phone. Without this, you may receive an
INSTALL_FAILED_DEXOPT error when installing new apps.
Note: You will need to redo this everytime you flash a new
/system partition (e.g. flashing an updated LineageOS zip or a different ROM).
Note for Magisk users: Apply Android patches before installing Magisk to be sure everything is working correctly.