Diving down the Magisk rabbit hole

Sihan Goi
Sihan Goi
Jul 29, 2020 · 11 min read
Magisk logo

[Disclaimer: The goal of this article is to bring academic insights to Magisk’s functionalities and how Magisk evades root detection. The insights shared are purely for learning purposes. The author and CSG does not condone, encourage, nor intend for the lessons described below to be used for any purposes other than cybersecurity research.]

Introduction