SkillAgentSearch skills...

PixelFlasher

Pixel™ phone flashing GUI utility with features.

Install / Use

/learn @badabing2005/PixelFlasher
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<div id="toc"> <img src="/images/icon-dark-128.png" alt="PixelFlasher Icon" align="left" /> <ul style="list-style: none;"> <summary> <h1>PixelFlasher</h1> </summary> </ul> </div>

License Github Releases

<BR>

Table of contents

Description / Features

As the name suggests this is an application to flash (update) Pixel™ phones (possibly all Google™ made phones/tablets, YMMV.)
PixelFlasher at its core is a UI layer (with bells and whistles) on top of adb / fastboot commands, hence many of its features can be used on non Pixel devices as well. (YMMV).
The executable which can be found in releases section is self contained single file and does not require Python™ to be installed on the system.

The application has two modes, normal mode (basic) and advanced mode (expert).

Basic mode: Should suit most users. Some of the features in basic mode are:

  • Simple UI interface, click and go. No more command line, no more placing all files in one directory.
  • boot.img / init_boot.img management UI, select the boot / init_boot file to patch and click the patch button. Fully Automated patching with Magisk, Apatch, KernelSU, KernelSU-Next, SukiSU, Wild_KSU (without manual steps) and perform upgrades without losing root.
    No more manually extracting files transferring to the phone, patching / re-flashing and doing multiple reboots.
    No more setting airplane mode and clearing storage to retain Play Integrity passing.
  • Display details of boot.img, init_boot.img, vendor_boot.img
    • SHA1 checksum.
    • Origin (file it was extracted from).
    • Whether it is patched or not, and if it is patched.
      • What version of Magisk was used to patch it.
      • On what device it was patched.
      • Date of patching.
      • The SHA1 of the source boot.img file.
      • Image size
      • Hash algorithm
      • Prop: *.os_version
      • Prop: fingerprint
      • Prop: secuirty_patch
      • Kernel build / date
    • Option to Live boot from a choice of stock image or patched image.
    • Flash just the selected boot / init_boot / vendor_boot image (stock or patched).
  • Choose to keep data or wipe data while flashing (Full OTA flashing always keeps data).
  • Ability to flash even if multiple devices are connected to the computer.
  • Option to flash to inactive slot (Full OTA always flashes to inactive slot).
  • Display information about the phone.
    • ID
    • Hardware model.
    • Device architecture.
    • Current installed firmware (build).
    • If it is rooted and with which tool and version.
    • Which of the supported rooting applications are installed and their respective versions.
    • List installed Magisk modules.
    • Connection mode (Adb | Fastboot | Sideload | Recovery).
    • Bootloader version.
    • Active slot.
    • Android OS API version.
    • Convenient quick links to download Android platform tools or device firmware.
    • And a lot more...
  • In app download of all Pixel phone / watch firmware images, full OTA images, beta images and canary images (past an present).
  • Rooting Application installation UI, screenshot. Supported versions:
    • Magisk stable (official)
    • Magisk beta (official)
    • Magisk debug (official)
    • Magisk Release (official)
    • Magisk Pre-Release (official)
    • KernelSU
    • KernelSU-Next
    • Apatch
    • SukiSU
    • Wild_KSU
    • Magisk zygote64_32 canary
    • Special builds that disable modules (used to recover from bootloops due to bad modules).
      • Magisk special v30600
      • Magisk special v27001
      • Magisk special v26401
      • Magisk special v25203
  • Magisk Backup Manager, screenshot.
    • List all Magisk backups currently on the device.
    • Highlight the one that is backup of the current installed version.
    • Delete backups.
    • Manually add backup from PC.
    • Auto Backup: PixelFlasher figures out what needs to be backed up, and if it finds it on the PC, it creates the backup.
  • Magisk settings management, screenshot:
    • Enable / disable Magisk modules, this comes in handy to disable suspect modules before an upgrade.
    • Install Magisk module (zip selection).
    • Direct install common Magisk modules:
    • Enable / disable Zygisk.
    • Enable / disable Magisk denylist.
    • Add / remove application to Magisk denylist (through PixelFlasher's App Manger).
    • Grant / deny / SU permissions to an app, with control of (through PixelFlasher's App Manager):
      • Enable / disable notifications
      • Enable / disable logging
      • Grant until (Forever, 10 min, 20 min, 30 min, 60 min)
    • Revoke SU permissions
  • Display Android Platform Tools (SDK) version and warn / block if the version is old or has known issues.
  • Install APK (an app) file from the computer onto the device with optional:
    • Set ownership to Play Store Market
    • Bypass low target sdk block
  • Wireless Manager, to wirelessly connect to adb debug or adb wireless with pairing support.
  • Advanced features are hidden to keep the interface simple and easy to follow.
  • Easily open ADB shell to the device.
  • Support for Genymotion Scrcpy to mirror Android devices (video and audio) via USB or over TCP/IP, and allows to control the device with the keyboard and the mouse of the computer.
  • A lot of checks and validations for smooth operation with quite verbose console output to inform about every step of the operation.
  • Automatic check for program and Magisk module updates.
  • App Manager, screenshot:
    • Disable (Freeze)
    • Enable
    • Uninstall
    • Add to Magisk Denylist
    • Remove from Magisk Denylist
    • SU Permissions
    • Install APK
    • Download APK
    • Launch
    • View Application Permissions
    • Kill
    • Clear Application Data
    • Multi-Select
    • Show Package Details.
    • Add / remove app to Magisk denylist.
    • Control app's superuser permissions, screenshot.
    • Export Application list
    • Filtering
  • Configurable Toolbar
  • Pif Manager (see a bit outdated but still valid UI Workflow)
    • Automatically detect Pif related installed modules and manage.
      • Pull / Modify / Push Pif prints to device
      • Cleanup DroidGuard
      • Push keybox.xml
      • Edit TrickyStore Target
      • Edit TrickyStore SP
      • Process an image file to extract Pif print
      • Process build prop(s) to extract Pif Print
      • Check / Auto-check Play Integrity.
        • Play Integrity API Checker
        • Simple Play Integrity Checker
        • Android Integrity Checker
        • TB Checker
        • Play Store
      • Automatically get Pixel Beta Pif ()
      • Get the Canary miner
      • Get TheFreeman193 random Pif
      • Conversion tools
      • Built in json validation
    • Automatically detect TargetedFix module and manage.
      • Add TF Target
      • Delete TF Target
      • Edit TF Tagets
      • Push TF Prop
  • PI (Play Integrity) Analysis Report to troubleshoot PI related issues.
    • Device state and other device related details
    • Magisk (if available):
      • modules list.
      • denylist.
    • TrickyStore (if available):
      • /data/adb/tricky_store/spoof_build_vars
      • /data/adb/tricky_store/keybox.xml (Not the contents, just if the certificates are revoked or not)
      • /data/adb/tricky_store/target.txt
      • /data/adb/tricky_store/security_patch.txt
      • /data/adb/tricky_store/tee_status
    • PlayIntegrity Fork (if available):
      • /data/adb/modules/playintegrityfix/custom.pif.json
      • /data/adb/modules/playintegrityfix/custom.pif.prop
      • /data/adb/modules/playintegrityfix/custom.app_replace.list
      • /data/adb/modules/playintegrityfix/scripts-only-mode
    • TargetedFix (if available):
      • /data/adb/modules/targetedfix/pif.json
      • Contents of evert app json configuration referenced in target.txt
    • PlayIntegrityFix (if available):
      • /data/adb/modules/playintegrityfix/pif.json
      • /data/adb/pif.json
    • Whether a testkey ROM is used or not.
    • logcat for PlayIntegrity and TrickyStore related logs.
    • Playstore and GMS versions.
    • Droidguard VM list.
    • If any custom ROM injection apps are installed from:
      • Xiaomi.eu
      • EliteRoms
      • helluvaOS
      • hentaiOS
      • Evolution X
      • PixelOS
    • Check overlays (if contents of /debug_ramdisk is visible without root)
  • My Tools, add / remove and manage personal tools to be launched from within the app.
  • Dev Tools
    • Check keybox validity (one

Related Skills

View on GitHub
GitHub Stars2.1k
CategoryDevelopment
Updated18h ago
Forks247

Languages

Python

Security Score

100/100

Audited on Mar 24, 2026

No findings