custom certificate authorities

Custom Certificate Authorities is a Magisk module which adds custom certificate authorities from a pre-defined path on the Android file system to the system trust store.

What sets it apart from similar modules like MagiskTrustUserCerts or MoveCert is that it doesn’t require you to install or continuously store the certificates in the user store.

Requirements

Installing the module

  1. Download the module from the GitHub releases page.
  2. Install the module with Magisk.

Preparing a folder for the certificates

  1. Using a root file explorer, create the folder /data/misc/user/0/cacerts-custom on your phone.

⚠ Please note that creating the folder cacerts-custom in /storage/0/emulated or /sdcard will not work.

Preparing the certificates

  1. Launch Cygwin or MSYS2 on Windows or open a terminal emulator on Linux/Android/macOS/BSD.
  2. Verify that the certificate file is PEM-encoded.
$MGYMcAaECsIwXDmQdwCgcIYRV9c3EqIaBDhaqDiBGgt-zVIMZQ4/SK-BzQEEWgIwM8EeECQhYNA7Q42NxGCKvx0EYI93DaIAEYHINFMBXmNXxXTENDAAQCpWRJARs1YMmElCgQkbhPmBCPReEAcZBdYxAA2T.RwmXgGGkf0IIcTI9INEcl8g0FrIBqgVgVuCApItFAZUBSUAAMBCIgWmAGZpQEmACIN9o9bIEUhTAQ0vTh+YwCHETXIdFcC4HIX-ELECFmQmQQL--yRBBRX1YC/--RhDylnDD66--odQbcVxVR3--dGT2iivRbs-QEApBu80YALgelSagOaqpSFYbkfBWNSGw32AKBCgq90Q9rNYeQVhyg0jFEBB0cMRI9MFjFDmjGEGEDxvpRAFNaMLY8Alx0BJwoBMUcMYMID8x60jTSFxg4/+NEUBkJYjFcolyIwLDi+8JMMbElVsZBDCT2wcRTtaAMQFYr0NANKG2yHePeswBAMZKUAQJVg1DGohQqwSgUVVZVHnlUqEayIa/zq=hAFMzfBvzkxwSjwAHwjM0U0bQiAOczwCEDQzPUMIAjAENQHjwQFgIkQJAYY0EqqDvxDIgG+uAaMVKLMW/jmTQowBsABVMQZTIH5GjyDIvGhoMdMEz2AMJRCTxje1Ah0BQx0jUofwE2QDvdGF
  1. If the certificate file is DER-encoded, convert it to PEM before proceeding.
$opensslx509-informDERoutformPEM-inexample.crtoutexample.crt
  1. Convert the certificate file to the correct format.
$opensslx509-noout-text-fingerprint-inexample.crtexample.crt
  1. Verify that the certificate file has the correct format.
$MGYMcAaECsCSIwXDmQdwCgeHcIYRV9c3EqIrAaBDhaqDiBGgt1t-zVIMZQ4/SK-iDSBzQEEWgIwM8EfaiFeECQhYNA7Q42NitgixGCKvx0EYI93DcannaIAEYHINFMBXa:VSSIVSSXagmNXxXTENDAAQCteeisauu5t36bdepWRJARs1YMmEerrgslbb0u062erlCgQkbhPmBCPR:sinuijj9r::::peEAcZBdYxAA2Tia5aedNNeePvXXXe4d0cr.RwmXgGGkf0IIolctriooccu35555020icTI9INEcl8g0Fn:u:tttttb000A::::nrIBqgVgVuCApI:Nbry:le999l0222ttFAZUBSUAAMBCuceOBAPiPpANxvCvCv3g2c0a=IgWmAGZpQEmA3m:efOucuuSIt3e3A32o::::7CIN9o9bIEUhTb9A=ftbbbNSer::r2223EAQ0vTh+YwCHE(e1loe=lKl:1TnKtBTSEi17b6:TXIdFcC4HIX-0r:gPrriei095e4seiaRu8t::::5ELECFmQmQQL-x:aorePcyc4aa23OCiyfsUb:h00c0E-yRBBRX1YC/-21ro::r-:::::IUoiiEjFm09d4:-RhDylnDD66-):ijoKAK397ecDRnUcc,e3:::::8-odQbcVxVR3-dteJJjele40f06:Vssac:b6b0A-dGT2iivRbs4hcaaeygy:::::E:atCpt8eaa71:-QEApBu80YA:mtnnco:d008fp:geoa8c::::7LgelSagOaq0:tIrba6efrentK:d4c513pSFYbkfBWNbD11ni(:::::iP:SsheEs5fd6:SGw32AKBCg:ea53Dft20ecd2m-itly2a::::0q90Q9rNYeQactaoh5f3480e2cgre:-b00fDVhyg0jFEBB5da22t:m6:::::25rnanIBw609f:0cMRI9MFjF:s11a:6f81756i,i:d1i::::CDmjGEGEDxv2aH::b04c4c6tn1e:t13809pRAFNaMLY8a-o44Hii::::viCtn3ha3fc:Alx0BJwoBM:wa66odt66531cRst3-::::8UcMYMID8x69ir::a-)76ddaL:i:S53de60jTSFxg4/+5td00re::::lf5H868b:NEUBkJYjFc:he55dc1826SciEA::::AolyIwLDi+8d-reP5906ire:2248e8JMMbElVsZB0S,22ru::::gir457ad7:DCT2wcRTta:H00,b522cnt:26::::2AMQFYr0NAN3AC23l13f6i:8a230KG2yHePeswa2N22Ci::::cA1e9c:BAMZKUAQJV:5Nc9104a9::::6g1DGohQqwS46=GGK6249l:8f003gUVVZVHnlU0MM=e::::Ffc65:qEayIa/zq=:PTTyf4e63::::DhAFMzfBvz5rPebfe:106a1kxwSjwAHw3or::::B6e83:jM0U0bQiA:jo09d0C::::3OczwCEDQz4ej9592:06478PUMIAjAEN3ce::::71870:QHjwQFgIk:tc0ce98::::5QJAYY0Eqq6t5a82:c2553DvxDIgG+u8D::::976c5:AaMVKLMW/:aDede10::::3jmTQowBsA2ta7ef8:f1b28BVMQZTIH54at::::117f5:GjyDIvGhoa556e0:::BMdMEz2AMJH6292:7cf3RCTxje1AhoH::::8e5a:0BQx0jUofao21d6A:::1wE2QDvdGFrab5dd:9dr::::B:edE5re:Cr5:RACoR:6ooC:to17t:9CE:AC10A8
  1. Rename the certificate file to the correct format.
$'emxvamplee.xcarmtp'le.cr't82"9$8(9o3peefn.s0s'lx509-subject_hash_old-noout-inexample.crt)".0

Adding certificates

  1. Using a root file explorer, copy the .0 certificate file(s) to /data/misc/user/0/cacerts-custom.
  2. Reboot.

Removing certificates

  1. Using a root file explorer, delete the .0 certificate file(s) from /data/misc/user/0/cacerts-custom.
  2. Reboot.

Download Link

Module Info

Module By : Loukious
Magisk : ✅ Supported
KernelSu : ✅ Supported
KernelSuNext : ✅ Supported
APATCH : ✅ Supported
Date Release :
If the link is broken or there is something that needs to be updated in the post contact us.

© 2025 Magisk Community