Introduction

Geergit - Protect your privacy.

What is Geergit?

Geergit is an Xposed module designed to spoof device identifiers on your Android phone. When applications attempt to access device IDs, Geergit intercepts these requests and provides your custom values instead, keeping the original IDs untouched on your device.

Requirements

  • Rooted Android Device — Root access is required
  • Xposed Framework — Must be installed (LSPosed, EdXposed, or Xposed)
  • Android 9+ — Minimum supported OS version

If you're unfamiliar with Xposed Framework, read this introductory blog post first.

!WARNING Before installing, back up your ROM and important data. While Geergit has been tested on multiple devices, issues are always possible.

Key Features

Core Spoofing:

  • Android ID, IMEI 1/2, Hardware Serial
  • Bluetooth MAC, Wi-Fi MAC, Wi-Fi SSID, Wi-Fi BSSID
  • Phone Number, Advertising ID
  • SIM Operator, MCC/MNC, SIM Subscriber, SIM Card Serial
  • Google Services Framework (GSF), DRM/Media DRM
  • Gmail Account Spoofing
  • Device Information (Manufacturer, Model, Build ID, Fingerprint, Android Version)

Organization & Management:

  • One-click randomization of all identifiers
  • Create profiles per app or group
  • Organize profiles into folders
  • Backup/Restore app data
  • Create groups of target apps
  • Add notes to profiles
  • Cloud sync for profiles (Alpha feature)

Privacy & Security:

  • Hide root, Xposed, and other sensitive markers
  • Mock location support
  • Complete device signature control

Quick Start

1. Setup Geergit — Installation and initial configuration steps

2. Identity Section — Core feature for managing device identifiers

3. Profiles — Save and reuse identity configurations (Alpha feature)

How It Works

  1. Install Geergit via Xposed/LSPosed manager
  2. Select target apps
  3. Customize device identifiers in the Identity section
  4. Generate random identities or manually edit fields
  5. Save configurations as profiles for reuse
  6. Geergit intercepts system calls and returns spoofed values

Next Steps