IMPORTANT: This has been replaced by

If you want to update, please UNINSTALL this version of RootCloak, and install the new version. The package name has been changed.


    Please read top before downloading!

This is a module for Xposed Framework v2.4.1 (with XposedBridge v42).
This allows you to run apps that detect root without disabling root. You select from a list of your installed apps (or add a custom entry), and using a variety of methods, it will completely hide root from that app. This includes hiding the su binary, superuser/supersu apks, processes run by root, and more.

-Xposed Framework v2.4.1 (with XposedBridge v42)
-Root (otherwise why use this ;) )

1) Make sure you have Xposed Framework v2.4.1+ installed (with XposedBridge v42+).
2) Install RootCloak.
3) Enable RootClock in the Xposed Installer app. Do this by opening Xposed Installer, going to Modules, and pressing the check box next to RootClock.
4) Reboot your phone.
5) Open RootClock settings (just open the app from the launcher), and then go to Add/Remove. This is where you will change which apps RootCloak hides root from.
6) FIRST TIME USERS ON VERSION 1.2 AND LOWER: Go to the menu (3 dots), and press "Reset to Default Apps".
7) If the app you want is not among the default apps, press the + button to add it. Find the app in the list, and press it to add it to the list.
8) Exit RootCloak settings. If the app you just added was already running, either FORCE CLOSE it, or reboot your phone.
9) Run the app to see if root was successfully hidden.

Devices/OS Tested:
HTC One GPE - 4.3 (Jellybean)
HTC One GPE - 4.4.x (KitKat)

>>Apps successfully tested:
DME Mail - Excitor -
Fox Digital Copy - Fox -
DirecTV GenieGo - DirecTV -
Best Buy CinemaNow - Best Buy -
Bright House TV - Bright House -
Mobile Pay - Apriva -
AprivaPay - Apriva -
IKO - PKO Bank Polski SA -
Bradford Mobile Agent - Bradford Networks -
ParcelSend - Australia Post Digital -
Worx Home by Citrix - Zenprise -
Movies by Flixster - Flixster -
Sparkasse - Star Finanz GmbH -
City Video (Citytv) - Rogers Digital Media -
ラブライブ!スクールアイドルフェスティバル - KLab -
예스24 전자도서관 (Yes24) - YES24 -
Yuppi - Yuppi Mobil A.Ş. - ( as of v1.2)
AirWatch MDM Agent - AirWatch - (as of v1.2)
D3 GO - D3 GO - (as of v1.2)

Not currently working (reason to be determined):
Puzzles & Dragons - GungHoOnlineEntertainment -
McAfee EMM - McAfee Mobile Security -
Virgin TV Anywhere - Virgin Media -

Apps that need more testing/analysis:
App: Good for Enterprise - Good Technology -
Reason: It doesn't seem to check for root using the NDK, but I cannot be sure. The updates that I have made to RootCloak may handle GFE, but I have no way of testing.

Apps with calls most likely can never be directly intercepted by Xposed:
App: WebTV - Stofa -
Method: Detects root by checking for the existance of the su binary. It uses fopen() and access() in order to do this check via native library (built with Android NDK).
Relevant Files: OR (internal libraries)

App: Yelo TV - Telenet -
Method: Detects root via native library (built with Android NDK). Unsure of exact method, but the strings "ERROR: Device is rooted. aborting execution" and "ERROR: Debbuger running. aborting execution" can be found in the library.
Relevant Files:

App: Sky Go - BSkyB -
Method: Most likely detects root via native library (built with Android NDK). Unsure of exact method, but the Java portion of the app contains "VGDRM_STATUS_DEVICE_IS_ROOTED = -41942891", and based on the library name, it's a safe bet.
Relevant Files:

App: Barclays Mobile Banking - Barclays -
Method: Most likely detects root via native library. Using FileObserver you can see it accessing /system/(x)bin/su, but since I am hooking all File constructors and exec() methods, there is no way it is done without the native library.
Relevant Files: TBD

App: S-pushTAN - Star Finanz GmbH -
Reason: Uses a native library to check for root. There is a callback inside the Java code, so it's possible to intercept that at the Java level, but that can be patched fairly easily.
Releveant Files:

Apps that need testing (I cannot test due to Play Store restrictions):
Barclays Homeowner - Barclays -
MobileTV - Deutsche Telekom AG -

Please post on XDA if you find an app that RootCloak successfully or unsuccessfully works with! In additional, while it shouldn't interfere with any other modules, please let me know if you encounter any bugs or issues!

Version name: 
Release type: 
Stable (low risk of bugs)
Number of downloads: 
487,978 in total · 298 in the last 24 hours
MD5 checksum: 

Added Slovak (thanks pylerSM) and Traditional Chinese(Taiwan) (thanks Eric850130) translations. Reorganized the code so its more legible. Added a lot of default apps and keywords, fixed the broken activities, and fixed how exec() was being handled (sh -c works a differently than I expected).

Version name: 
Release type: 
Stable (low risk of bugs)
Number of downloads: 
31,935 in total · 21 in the last 24 hours
MD5 checksum: 

Added reset/clear confirmation dialogs. Added hooks for getInstalledPackages (thanks sirdigitalpython) and getPackageInfo. Added the ability to customize which commands and keywords RootCloak hides from the selected apps.