🎉 New APatch release 10763 is available 🎉
Changelog Upgrade KernelPatch to 0.10.7 Upgrade java and rust dependences Fix compat syscall, 32-bits su command is supported now Shrink apd size Remove buggy and redundant hide manager feature Re-designed About and Module Screen UI, thanks to SanmerDev MRepo's design Fix os error 2 during installing modules Switch to new enableEdgeToEdge, drop accompanist/systemuicontroller Optimize APatch Safe Mode Fix module online upgrade not working Re-design exclude modifications feature Translation imported, thanks to all translators More optimizations and minor changes
Notes The newly designed exclusion module modifies the logic, and from now on, applications that have already been granted ROOT permissions no longer support exclusion because it does not conform to the logic of normal usage scenarios; By default, modules will no longer be excluded because not all software will check the current environment, which undoubtedly brings unnecessary power consumption and heat to the phone. You can manually configure the applications that need to be excluded. It should be noted that if you are upgrading from a version of KernelPatch below 0.10.7 instead of a completely new installation, you need to manually delete the/data/adb/ap/package_config file and reconfigure it on the SuperUser screen, otherwise a BUG may be occurred. We have noticed that some older devices (mainly those with Linux kernel versions less than 5) may experience unlimited loading of SuperUser Screen, and even some applications may not be able to use ROOT permissions. This is a known issue and is currently under investigation.
👉 Report bug or feature request: https://github.com/bmax121/APatch/issues/new/choose
🎉 New APatch release available 🎉
Full Changelog: https://github.com/bmax121/APatch/compare/10570...10657
This version includes many updates. Please backup important data before installation or upgrade. We are pleased that Zygisk Next has added support for APatch. To be compatible with its whitelist function, we have added an "exclude" setting button. It should be noted that if Zygisk Next is not used, it has no practical significance because we have not yet implemented this feature due to time constraints. It is a known issue that some software cannot obtain ROOT permission, but only a very small number of software have experienced this bug. We are doing our best to solve and develop it. Thank you for your support and understanding.
Report bug or feature request: https://github.com/bmax121/APatch/issues/new/choose
Full Changelog: https://github.com/bmax121/APatch/compare/10569...10570
Full Changelog: https://github.com/bmax121/APatch/compare/10568...10569
Full Changelog: https://github.com/bmax121/APatch/compare/10533...10568
The patching of Android kernel and Android system.
inline-hook
and syscall-table-hook
enabled).Or download the latest APK from the Releases Section.
Support for Samsung devices with security protection: Planned
Kernel configs:
CONFIG_KALLSYMS=y
and CONFIG_KALLSYMS_ALL=y
CONFIG_KALLSYMS=y
and CONFIG_KALLSYMS_ALL=n
: Initial support
The SuperKey has higher privileges than root access.
Weak or compromised keys can lead to unauthorized control of your device.
It is critical to use robust keys and safeguard them from exposure to maintain the security of your device.
To help translate APatch or improve existing translations, please use Weblate. PR of APatch translation is no longer accepted, because it will conflict with Weblate.
For usage, please refer to our official documentation.
It's worth noting that the documentation is currently not quite complete, and the content may change at any time.
Furthermore, we need more volunteers to contribute to the documentation in other languages.
APatch is licensed under the GNU General Public License v3 GPL-3.