Update - As of 2017/10/31, the exploit again longer works in the latest version of Knox Messenger. This is subject to change with updates because of proguard.
This is a sample proof-of-concept exploit for Samsung's Knox Messenger. This exploit has already been reported to the Knox Messenger Team.
Samsung's Knox Messenger Attempts to detect root on a device and exits if yes. This project bypasses the said root detection by using Xposed Framework to framework to hook into the app's root detection function call and return no root detected.
- This application requires android version 4.0.1 or later (Android IceCreamSandwich or later - so far JellyBean, Kitkat, Lollipop, Marshmallow and Nougat)
- Make sure you have Xposed Framework installed and running.
- Build this project in Android studio and install the produced apk. You can also get the latest release of the APK from the Xposed Module Repository
- Reboot your phone.
No UI. Simply install, enable the module in Xposed Installer, Reboot, and done. The very first time you start Knox Messenger after installing this, it may complain that the device is rooted but it proceeds to login none-the-less
If you like this project, buy me a cup of coffee! :)
This program is Samsung Knox Messenger Root Bypass Copyright (C) 2017 Akhil Kedia
This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.