ADB hack without a PC (Android 11+)

Dimlos

Well-known member
It is possible to do ADB hack and adb tcpip 5555 with Termux, but I don't think it's for beginners.
 

chaoscreater

Active member
It is possible to do ADB hack and adb tcpip 5555 with Termux, but I don't think it's for beginners.
Never said it is. Also, you could have just edited your last message.

People need to stop posting ADB questions and flood the forum. There's already plenty of discussions on this.


OR, if you can root your device, then just root it and hide root from apps. I'm able to hide root from even Microsoft Company Portal and various banking apps without any issues. Normally, the downside to rooting is that apps can detect and block you from using it, but if these apps that are notoriously hard to spoof can be spoofed from detecting root, then there's no reason why you shouldn't root your device.
 

Carl Zyex

New member
@chaoscreator
Not that simple. If you root, most apps based on security will fail, like banking or digital identity ones (and I think this is positive). I have always rooted my phones (LG G3, SAMSUNG A6, S21...), but not my current one, which relies on critical apps.
That's why Shizuku could be a simple and stable root-like solution.
 

chaoscreater

Active member
@chaoscreator
Not that simple. If you root, most apps based on security will fail, like banking or digital identity ones (and I think this is positive). I have always rooted my phones (LG G3, SAMSUNG A6, S21...), but not my current one, which relies on critical apps.
That's why Shizuku could be a simple and stable root-like solution.
You can easily hide root from those apps if you know what you're doing.

I can hide root from Microsoft InTune / Company Portal, which is actually quite a feat in itself because Microsoft actively updates Teams and Company Portal to detect rooted devices. They are always making sure that your device is in compliance with company policies. I've also hidden root from various banking apps, as well as apps that detect mock location spoofing, etc. All of this can be easily done.

Shizuku has limitations and there are other things that it can't achieve but root can.

It's up to the individual user and their skill level I suppose.
 

Th1aG0

New member
15.Launch aShell
16.Input ADB command in Command Box
Could you confirm, if after ending all the steps, the ADB commands will be set forever on my device? How can I check the commands I set are working privately? Do I need to leave Shizuku active for the commands setting made on aShell to work?

If the configuration is not set forever. Do I need to repeat this process every time my device is rebooted, or that I disconnect the WiFi on my phone?
 

Dimlos

Well-known member
I believe the ADB hack will persist until the app is uninstalled.
aShell cannot be used unless the Shizuku are activated.
Rebooting the device or operating WiFi will not remove the ADB hack.
 
Top