PixelSPoof
a fork of the caiman spoof repository by @RisenID
Install / Use
/learn @samuelKuseka/PixelSPoofREADME
PixelSpoof
What is PixelSpoof?
PixelSpoof is an advanced Xposed module for LSPosed that allows you to spoof device-specific properties to various Pixel devices, including the latest Pixel 10 Pro XL with Android 16 QPR2. Get access to Pixel-exclusive features on any Android device!
✨ Features
- Multiple Device Profiles: Switch between Pixel 10 Pro XL, Pixel 10 Pro, Pixel 9 Pro XL, and more
- Dynamic Updates: Device profiles automatically update from GitHub (no app update needed)
- Configuration UI: Easy-to-use settings app with global and per-app configuration
- Per-App Spoofing: Fine-grained control over which apps see spoofed properties
- Latest Android 16: Supports the newest Android 16 QPR2 builds
- Real-time Diagnostics: Live monitoring of spoofing effectiveness and system status
- Behavioral Evasion: Advanced techniques to avoid ML-based detection
- Comprehensive Testing: Built-in test harness for validation and troubleshooting
⚠️ Important Reality Check
Please read this carefully before using:
What PixelSpoof CAN Do:
- ✅ Spoof device properties that apps read via
SystemProperties.get() - ✅ Spoof Build class fields and system properties
- ✅ Intercept network requests and spoof headers
- ✅ Handle context acquisition issues
- ✅ Work with basic apps and some streaming services
What PixelSpoof CANNOT Do:
- ❌ Bypass hardware-backed attestation (Titan M2 chip, Play Integrity API)
- ❌ Bypass kernel-level security (SELinux, dm-verity, verified boot)
- ❌ Fool advanced banking apps with hardware security checks
- ❌ Bypass server-side device verification (Google's device database)
Realistic Success Rates:
- Basic Apps (social media, streaming): 70-90%
- Google Services: 80-95%
- Banking Apps: 20-40% (depends on implementation)
- Hardware-Backed Security: 0% (impossible from userspace)
How to install
Prerequisites
To use this module you must have one of the following (latest versions):
- Magisk with Zygisk enabled
- IMPORTANT: DO NOT add apps that you want to spoof to Magisk's denyList as that will break the module.
- KernelSU with ZygiskNext module installed
- APatch with ZygiskNext MOD module installed You must also have LSPosed installed
Installation
- Download the latest APK of PixelSpoof from the releases section and install it like any normal APK.
- Now open the LSPosed Manager and go to "Modules".
- PixelSpoof should now appear in that list.
- Click on PixelSpoof and enable the module by flipping the switch at the top that says "Enable module".
- Next, tick all the apps that you want to spoof details for and reboot your phone afterwards.
- Once rebooted, you can open the PixelSpoof app to configure which device profile to use.
Configuration
- Open PixelSpoof app from your app drawer
- Global Configuration Tab: Select your default device profile
- Per-App Configuration Tab: Enable/disable spoofing for specific apps and assign custom profiles
- Diagnostics Tab: Monitor spoofing effectiveness and troubleshoot issues
- Click Apply and reboot your device when making global changes
- Refresh profiles anytime to get the latest device properties from GitHub
Per-App Configuration
- Enable/Disable per app: Control which apps see spoofed properties
- Custom profiles: Assign different device profiles to different apps
- Real-time switching: Changes apply immediately without reboot
- Smart defaults: Apps automatically use global profile unless customized
🧪 Testing Framework
PixelSpoof includes a comprehensive testing framework to ensure reliability and effectiveness:
Running Tests
On Linux/macOS:
./run_tests.sh
On Windows:
run_tests.bat
Test Coverage
The test suite covers:
- ✅ Profile Management: Device profile loading, validation, and switching
- ✅ Property Spoofing: System property interception and spoofing
- ✅ Per-App Configuration: App-specific profile management and validation
- ✅ Behavioral Evasion: ML detection avoidance and touch pattern simulation
- ✅ Error Handling: Comprehensive error handling and recovery
- ✅ Safety Validation: Pre-flight safety checks and system validation
- ✅ Network Interception: HTTP header spoofing and request interception
- ✅ Runtime Validation: Spoofing effectiveness validation and diagnostics
- ✅ CI/CD Pipeline: Automated building, testing, and deployment
Test Reports
After running tests, check:
- Test Results:
app/build/reports/tests/testDebugUnitTest/ - Coverage Report:
app/build/reports/jacoco/jacocoTestReport/html/index.html
Manual Testing
For manual validation:
- Install the module and enable it in LSPosed
- Run the test suite to verify core functionality
- Use device info apps to verify spoofing effectiveness
- Test with target applications (social media, streaming services)
- Check the diagnostics dashboard for real-time monitoring
🔍 Diagnostics Dashboard
The built-in diagnostics dashboard provides real-time monitoring and troubleshooting:
System Status
- LSPosed Module Status: Verifies module is properly enabled
- System Hooks Status: Confirms property spoofing hooks are active
- Spoofing Effectiveness: Shows success rates for property and network spoofing
Runtime Metrics
- Property Requests: Number of system property requests intercepted
- Properties Spoofed: Successful property spoofing operations
- Network Interceptions: HTTP requests intercepted and modified
- Headers Spoofed: User-Agent and other headers successfully spoofed
Per-App Statistics
- Enabled Apps: List of apps with spoofing enabled
- Custom Profiles: Apps using non-default profiles
- Success Rates: Per-app spoofing effectiveness metrics
Troubleshooting
- Common Issues: Pre-built solutions for frequent problems
- System Information: Device and module version details
- Safety Warnings: Guidance on realistic expectations
FAQ and issues
-
Q: How do I change which Pixel device to spoof?
A: Open the PixelSpoof app and select a different profile from the Global Configuration tab. -
Q: Can I use different profiles for different apps?
A: Yes! Use the Per-App Configuration tab to assign custom profiles to specific apps. -
Q: How do I monitor if spoofing is working?
A: Check the Diagnostics tab for real-time metrics and system status. -
Q: Do I need to update the app for new device profiles?
A: No! Device profiles automatically update from GitHub daily. -
Q: Which apps work best with spoofing?
A: Camera apps, Google apps, and apps with Pixel-exclusive features work great. -
Q: What should I do if an app isn't working with spoofing?
A: Check the diagnostics dashboard for issues, or disable spoofing for that specific app in per-app settings.
Device Profiles Available
- Pixel 10 Pro XL (mustang) - Android 16 QPR2
- Pixel 10 Pro (frankel) - Android 16 QPR2
- Pixel 10 (blazer) - Android 16 QPR2
- Pixel 9 Pro XL (caiman) - Android 16 QPR1
- Pixel 9 Pro (komodo) - Android 16 QPR1
- Pixel 8 Pro (husky) - Android 15
Profiles are automatically updated with the latest build numbers and fingerprints!
Related Skills
node-connect
344.1kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
96.8kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
344.1kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
344.1kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
