Bypass Forced App Installations and Protect Privacy with the Fake Install Module
This article introduces the Fake Install Module, an Android XP module that forges install status to intercept multi‑dimensional detection, bypass mandatory third‑party app installations, and safeguard the device's app‑list privacy, with detailed usage scenarios and step‑by‑step installation guides for both rooted and non‑rooted devices.
Tool Overview
The Fake Install Module (com.install.appinstall.xl) is an Android XP module built on low‑level Hook technology. It fakes the installation state of apps, intercepts malicious install detection, bypasses forced‑install restrictions, and protects the privacy of the device's installed‑app list. Author: 永恒之蓝 (小淋).
Core Functionality
It intercepts PackageManager queries, file‑system checks, command‑line (pm/dumpsys) calls, and network requests, returning custom forged results (installed or not installed) to prevent apps from limiting features, forcing exits, or pushing downloads based on detection.
Example Use Case
When App A requires mandatory installation of App B to unlock core features, enabling this module can fake the "App B is installed" state, allowing App A to function without actually installing App B.
Applicable Scenarios
Privacy protection: block apps from querying the device's installed‑app list.
Restriction bypass: overcome apps that demand specific third‑party apps.
Anti‑detection: evade install‑status checks by app stores or third‑party apps.
Convenient usage: works without root via LSPatch (non‑root solution).
Key Capabilities
Dual‑mode state forging : switch between "installed" and "not installed" modes, automatically capturing target app queries.
All‑scenario detection interception : supports PackageManager, file system, command‑line, and network‑based checks, including plugin detection.
Exit interception : blocks app exits triggered by forged packages, offering silent or manual confirmation modes.
Automatic permission forging : auto‑forges core permissions such as QUERY_ALL_PACKAGES without manual granting.
Persistent configuration : saves floating‑window position, interception status, and forging mode across reboots.
Convenient Operations
Floating‑window shortcut: tap/double‑tap to open config panel, long‑press to hide/clear/reset, drag to reposition.
History memory: automatically silently intercept repeated detection scenarios.
One‑click cleanup: quickly clear captured package records and forged caches.
Prerequisites
Rooted device: install LSPosed (recommended) or EdXposed framework.
Non‑rooted device: install LSPatch framework (no bootloader unlock or root required).
Android version: 8.0+ (API 26) up to Android 16 (API 36).
Target app must be unprotected; protected apps may block the XP module.
Installation Guide
1. Root Solution (LSPosed/EdXposed)
Download the latest APK from the Releases page.
Install the APK, open LSPosed → Modules → find "Fake Install Module" → enable it.
Check the target third‑party apps you wish to forge (exclude system or cloned apps).
Restart the target app or reboot the device for the module to take effect.
2. Non‑Root Solution (LSPatch)
Open LSPatch → Add App → select "Embedded mode" or "Local mode".
Locate "Fake Install Module" and enable it, then generate a new APK.
Install the newly generated APK; the module activates automatically without root.
Note: Ensure the target app is unprotected and has no signature verification, otherwise the packaging will fail.
Tool Download
https://github.com/Xposed-Modules-Repo/com.install.appinstall.xlSigned-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Black & White Path
We are the beacon of the cyber world, a stepping stone on the road to security.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
