
UpdatedFeb 20, 2026
PublishedFeb 20, 2026
Packagecom.tsng.hidemyapplist
MD5a23598f0e021d9bcb71b54f354573d2f
SHA1 (signer)03:45:22:C2:73:09:1F:B5:93:B5:B5:25:41:09:1B:74:4D:0D:C5:C0
Signed byCN=Dr.TSNG
Architecturesx86, x86-64, armeabi-v7a, arm64-v8a
Malware scanTRUSTED
Contact[email protected]
What's new
Changelog:
Add syscall interception
Remove maps interception (Because it is meaningless. Though I am lazy to remove it from UI)
Support Zygisk (**Be sure to remove the old Magisk module first!**)
Note: **Uninstall old Magisk extension** before updating to V2.3.2, then install the new one via the install button in the app. Check the Telegram channel for more help.
Add syscall interception
Remove maps interception (Because it is meaningless. Though I am lazy to remove it from UI)
Support Zygisk (**Be sure to remove the old Magisk module first!**)
Note: **Uninstall old Magisk extension** before updating to V2.3.2, then install the new one via the install button in the app. Check the Telegram channel for more help.
Description
Although it's bad practice to detect the installation of specific apps, not every app using root provides random package name support. In this case, if apps that use root (such as Fake Location and Storage Isolation) are detected, it is tantamount to detecting that the device is rooted.
Additionally, some apps use various loopholes to acquire your app list, in order to use it as fingerprinting data or for other nefarious purposes.
This module can work as an Xposed module to hide apps or reject app list requests, and provides some methods to test whether you have hidden your app list properly.
Additionally, some apps use various loopholes to acquire your app list, in order to use it as fingerprinting data or for other nefarious purposes.
This module can work as an Xposed module to hide apps or reject app list requests, and provides some methods to test whether you have hidden your app list properly.
Required features
- Faketouch android.hardware.faketouch
Permissions (9)
Hide My Applist requests the following Android permissions:
- Access Adservices Ad Id android.permission.ACCESS_ADSERVICES_AD_ID
- Access Adservices Attribution android.permission.ACCESS_ADSERVICES_ATTRIBUTION
- Access Network State android.permission.ACCESS_NETWORK_STATE
- Internet android.permission.INTERNET
- Query All Packages android.permission.QUERY_ALL_PACKAGES
- Wake Lock android.permission.WAKE_LOCK
- Finsky Permission Bind Get Install Referrer Service com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE
- Gms Permission Ad Id com.google.android.gms.permission.AD_ID
- Com Tsng Hidemyapplist Dynamic Receiver Not Exported Permission com.tsng.hidemyapplist.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION