Requirements
Please make sure you have the following modules installed before using Integrity Box:
-
- Official Tricky Store or TEE Simulator (use any one)
-
- Zygisk Next or ReZygisk (use any one)
FAQ
-
What is IntegrityBox?
A complete Play Integrity compatibility and system-signal management toolkit. -
Who should use IntegrityBox?
Rooted users and custom ROM users who care about Play Integrity reliability. -
Why was IntegrityBox created?
Honestly? It started because so many people were selling keyboxes and I thought, “this is bad, everyone should have access to this for free.” So I made a tool that just gives you keyboxes without paying a cent. Then, well… I kept adding stuff. I kept improving things, fixing bugs, adding new ways to spoof, hide, clean, and optimize. And before I knew it… it turned into a beast of a module, probably the most powerful Play Integrity Fix anyone’s ever seen. It has so many features now that even I sometimes forget half of them 😭. But yeah, that’s the story: started small, got greedy with features, and now it’s the one-stop solution for anyone who wants STRONG or DEVICE integrity without the headaches. Just flash & forget, no need to do anything manually. -
Does IntegrityBox replace Play Integrity Fix/Fork module?
Yes! Starting from v28, PIF is fully integrated into IntegrityBox. The module ID was changed toplayintegrityfixto avoid conflicts, because honestly, using both at the same time doesn’t make sense. IntegrityBox now handles everything PIF did, plus all the extra features I’ve added along the way -
Does IntegrityBox improve compatibility with banking apps
Yes. -
Does it support DEVICE and STRONG integrity?
Yes, make sure you have installed tricky store or TEE simulator module. -
Is IntegrityBox safe to use?
Yes. -
Does it modify user data?
No. -
Does it modify installed apps?
No. -
Does it run constantly in the background?
No. -
Is it lightweight?
Yes. -
Does it increase CPU usage?
No, it may reduce it by optimizing targets. -
Does it drain battery?
No. -
Is everything configurable?
Yes. -
Can features be disabled individually?
Yes. -
Is there a global safety option?
Yes, the Kill Switch. -
What does the Kill Switch do?
Disables all experimental features. -
Can I recover easily if something breaks?
Yes. -
Is it safe to uninstall?
Yes. -
Does IntegrityBox collect any data?
No. -
Does it include telemetry or tracking?
No. -
Are any network connections required?
No (except optional downloads). -
Are downloads verified?
Yes, using hash verification. -
Does it automatically manage target.txt?
Yes. -
Does it reduce unnecessary Play Services load?
Yes. -
Does it handle keybox management?
Yes. -
Does it support multiple keybox injections?
Yes. -
Does it help with “Device not certified” issues?
Yes. -
Does it work on all ROMs?
It works best on clean, enforcing AOSP-based ROMs. -
Is SELinux enforcing recommended?
Yes. -
Does it support Pixel spoofing?
Yes. -
Can fingerprints be customized?
Yes. -
Does it handle ROM-specific spoofing conflicts?
Yes. -
Is this module actively maintained?
Yes. -
Is it beginner-friendly?
Yes, with built-in guidance. -
Is it suitable for advanced users?
Yes. -
Should I reboot after changes?
Only if you see a popup saying "Reboot to apply changes". -
Should I reboot after flashing?
Yes. -
Where should issues be reported?
Through the WebUI report option.
Module Features
This module provides a wide range of tools designed to improve compatibility, integrity results, and overall system cleanliness. All features are optional and fully configurable.
- Built-in assistant to help answer common questions and guide setup
- Option downloads recommended tools from their official release sources with hash verification
- Detects flagged, suspicious, or spoofed applications
- Fixes “Device not certified” issue in playstore
- Terminates GMS Vending process when required
- Spoofs Android and boot security patch levels
- Spoofs ROM
release keysandbuild tags - Spoofs LineageOS-specific property detection
- Spoofs
debug fingerprintdetection - Supports custom pixel beta fingerprint configuration
- Disables inbuilt PIF spoofing on various custom ROMs when needed
- Fixes
abnormalorinvalidboot hash values
- Spoofs
SELinuxstatus - Spoofs storage
encryptionstate - Spoofs
custom recoverydetection - Hides
PIF hookdetection - Prevents detection of
debugormodifiedsystem states
- Updates and maintains a valid
keybox.xml - Supports multiple keybox injections via TEE Simulator
- Automatically updates
target.txtbased on current TEE status - Blacklists unnecessary packages from
target.txt(this reduces cpu usage)
- Removes logs generated during
GAppsinstallation - Removes logs generated by
KSU / AP / Magiskmodules
- Disables
EU injectorby default - Spoofs storage-related and ROM-specific identifiers
- Spoofs
debug-relatedsignals - [Deprecated]
Switch Shamiko & NoHello modes
About Module Settings
Kill Switch :Enable this & reboot your device if you face any issue after flashing integrity box, this will disable all experimental settings.Debug Fingerprint :cleans debug tag from fingerprint to bypass custom rom detection and pass play integrity with stock fingerprintDebug Build :spoofs developement build as userBuild Tag :spoofs build tag to bypass custom rom detectionStorage Encryption :spoofs device storage as encrypted to fool banking appsSpoof Custom Recovery :spoofs custom recovery folder to bypass root detectionGet Recommended Modules :the most easiest and trusted way to download modules which are recommended to use with IntegrityBoxNo Redirect :you won't be redirected to release source on installation
About Module Description
![]() |
![]() |
![]() |
- 🟢🟢🟢 means the current keybox can pass STRONG integrity
- 🟢🟢🔴 means the current keybox can pass DEVICE integrity
- 🔴🔴🔴 means the current keybox is REVOKED and cannot pass play integrity
Common Failure Reasons
Play Integrity may fail if any of the following conditions are present:
- SELinux is set to
permissive - Higher Play Store version (higher than 40.xx)
- Conflicting Magisk / KernelSU / LSPosed modules
- Revoked or invalid keybox
- Banned fingerprint
- ROM inbuilt GMS spoofing is enabled (create
/sdcard/zygisk& flash IntegrityBox if you want to use ROM's inbuilt spoofing with IntegrityBox) - ROM inbuilt Play Store spoofing is enabled
- Root access is visible or not properly hidden
- IntegrityBox is not updated to the latest version
- Tricky Store is out of sync and requires reflashing
Ensure all requirements are met and recheck this list before reporting an issue.
About WEB UI Dashboard
Profile :Your current PlayIntegrity ProfileVending :Your current PlayStore versionLineage :Tells whether any lineageos prop exists or notSpoofing :Tell whether you're using ROM's inbuilt GMS spoofing or notSpoof :The name of pixel device, your playstore spoofed to!Patch :Your Android, Vendor security patch dateSELinux :Your ROM's selinux status. It should not be PERMISSIVETarget :Number of apps in tricky store's target.txt fileAndroid :Your android versionZygote :The zygisk implementation you are using
Credit & Acknowledgement
- ezme-nodebug
- PlayIntegrityFork
- Shamiko (open source late start service)
Report a Problem
- Use Report a bug/issue button in WebUI to report bugs/issues/feedback
- Enable
KILL SWITCHtoggle from webui >module settingsand reboot your device if you're facing any issue after flashing IntegrityBox. This wil disable all experimental features.
Troubleshooting
Google Play Integrity has fully replaced SafetyNet and is now the only attestation system used by modern apps. It checks whether a device looks trustworthy and close to a certified Android environment. Because of this, failures are common on outdated, heavily modified, or poorly configured systems.
Play Integrity checks do not only look at root status. They evaluate multiple system signals, including ROM configuration, SELinux state, system hooks, and how Google services behave at runtime.
To reduce false negatives and improve reliability:
-
Use a ROM with SELinux set to
enforcing.
ROMs running in permissive mode are frequently flagged. Even if everything else looks fine, permissive SELinux alone can cause integrity checks to fail. -
Keep Google Play Services and the Play Store fully up to date.
Play Integrity relies on Play Services to perform attestation. Old or mismatched versions can break communication with Google’s servers and lead to unexpected failures. -
Avoid system-level frameworks that hook core services.
Xposed, LSPosed, or similar frameworks, especially modules that interact with Google Play Services or the Play Store, are a common cause of integrity failures. Even “harmless” hooks can be detected. -
Minimize invasive system modifications.
Changes such as aggressive build.prop spoofing, signature spoofing, or runtime code injection increase the likelihood of detection unless they are carefully handled. -
Keep the system as close to stock behavior as possible.
The closer your device behaves to a certified, unmodified Android environment, the more consistent Play Integrity results will be.
Play Integrity is stricter than older systems and is actively updated by Google. Passing checks today does not guarantee passing them forever, especially on custom ROMs. Treat integrity passing as something that requires maintenance, not a one-time setup.
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |




















