Hide My Applist cover image
Hide My Applist icon

Hide My Applist

An Xposed module to intercept applist detections

Nullptr · com.tsng.hidemyapplist

0.0 50,000 50,000 v3.6.1.r462.4524dde 3.5 MB SDK 28+ PEGI-3 · Everyone

Hide My Applist screenshot 1 Hide My Applist screenshot 2 Hide My Applist screenshot 3 Hide My Applist screenshot 4
UpdatedFeb 20, 2026
PublishedFeb 20, 2026
Packagecom.tsng.hidemyapplist
MD5a23598f0e021d9bcb71b54f354573d2f
SHA1 (signer)03:45:22:C2:73:09:1F:B5:93:B5:B5:25:41:09:1B:74:4D:0D:C5:C0
Signed byCN=Dr.TSNG
Architecturesx86, x86-64, armeabi-v7a, arm64-v8a
Malware scanTRUSTED
Websitehttps://github.com/Dr-TSNG/Hide-My-Applist
Contact[email protected]

What's new

Changelog:

Add syscall interception

Remove maps interception (Because it is meaningless. Though I am lazy to remove it from UI)

Support Zygisk (**Be sure to remove the old Magisk module first!**)

Note: **Uninstall old Magisk extension** before updating to V2.3.2, then install the new one via the install button in the app. Check the Telegram channel for more help.

Description

Although it's bad practice to detect the installation of specific apps, not every app using root provides random package name support. In this case, if apps that use root (such as Fake Location and Storage Isolation) are detected, it is tantamount to detecting that the device is rooted.

Additionally, some apps use various loopholes to acquire your app list, in order to use it as fingerprinting data or for other nefarious purposes.

This module can work as an Xposed module to hide apps or reject app list requests, and provides some methods to test whether you have hidden your app list properly.

Required features

Permissions (9)

Hide My Applist requests the following Android permissions:

Tags

Related apps