Giter Club home page Giter Club logo

anti_android's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

anti_android's Issues

crash

device:
pixel
os:
android 8.1
root
log:

--------- beginning of crash
04-15 13:23:28.823  4191  4196 F libc    : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x10 in tid 4196 (Jit thread pool), pid 4191 (com.tg.anti)
04-15 13:23:28.858  4232  4232 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone
04-15 13:23:28.859   672   672 I /system/bin/tombstoned: received crash request for pid 4191
04-15 13:23:28.860  4232  4232 I crash_dump64: performing dump of process 4191 (target tid = 4196)
04-15 13:23:28.860  4232  4232 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
04-15 13:23:28.860  4232  4232 F DEBUG   : Build fingerprint: 'google/sailfish/sailfish:8.1.0/OPM1.171019.011/4448085:user/release-keys'
04-15 13:23:28.860  4232  4232 F DEBUG   : Revision: '0'
04-15 13:23:28.860  4232  4232 F DEBUG   : ABI: 'arm64'
04-15 13:23:28.860  4232  4232 F DEBUG   : pid: 4191, tid: 4196, name: Jit thread pool  >>> com.tg.anti <<<
04-15 13:23:28.860  4232  4232 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x10
04-15 13:23:28.860  4232  4232 F DEBUG   : Cause: null pointer dereference
04-15 13:23:28.860  4232  4232 F DEBUG   :     x0   000000773e50e4c0  x1   0000007735e0e000  x2   000000773e400000  x3   0000000000000002
04-15 13:23:28.860  4232  4232 F DEBUG   :     x4   000000000000010e  x5   0000000000000000  x6   0000000000000000  x7   000000000054bd62
04-15 13:23:28.861  4232  4232 F DEBUG   :     x8   0000000000000000  x9   1b458ebe585732f6  x10  0000000000000001  x11  000000773e462000
04-15 13:23:28.861  4232  4232 F DEBUG   :     x12  0000000000000086  x13  00000000000001ff  x14  0000000000000008  x15  00000edfd8c2855e
04-15 13:23:28.861  4232  4232 F DEBUG   :     x16  00000077bf1dfcb0  x17  00000077bf17b430  x18  0000000000000013  x19  00000077332d1800
04-15 13:23:28.861  4232  4232 F DEBUG   :     x20  0000007735e0e000  x21  000000773e50e4c0  x22  000000000000105f  x23  000000000000105f
04-15 13:23:28.861  4232  4232 F DEBUG   :     x24  000000773e263294  x25  000000773624b000  x26  00000077c30fda40  x27  0000000000000016
04-15 13:23:28.861  4232  4232 F DEBUG   :     x28  000000773e442609  x29  000000773634b450  x30  000000773e263858
04-15 13:23:28.861  4232  4232 F DEBUG   :     sp   000000773634b430  pc   000000773e263824  pstate 0000000060000000
04-15 13:23:28.863  4232  4232 F DEBUG   : 
04-15 13:23:28.863  4232  4232 F DEBUG   : backtrace:
04-15 13:23:28.863  4232  4232 F DEBUG   :     #00 pc 00000000004ba824  /system/lib64/libart.so (art::ThreadPoolWorker::Run()+76)
04-15 13:23:28.863  4232  4232 F DEBUG   :     #01 pc 00000000004ba328  /system/lib64/libart.so (art::ThreadPoolWorker::Callback(void*)+148)
04-15 13:23:28.863  4232  4232 F DEBUG   :     #02 pc 0000000000069c94  /system/lib64/libc.so (__pthread_start(void*)+36)
04-15 13:23:28.864  4232  4232 F DEBUG   :     #03 pc 000000000001eeec  /system/lib64/libc.so (__start_thread+68)
04-15 13:23:28.910  1374  1374 I WallpaperService: engine paused
04-15 13:23:29.296   672   672 E /system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_09
04-15 13:23:29.297   820  4233 W ActivityManager:   Force finishing activity com.tg.anti/.MainActivity
04-15 13:23:29.299   820   874 I BootReceiver: Copying /data/tombstones/tombstone_09 to DropBox (SYSTEM_TOMBSTONE)
04-15 13:23:29.304   820   846 I ActivityManager: Showing crash dialog for package com.tg.anti u0
04-15 13:23:29.309   820  1477 I WindowManager: WIN DEATH: Window{682e577 u0 com.tg.anti/com.tg.anti.MainActivity}
04-15 13:23:29.310   820  2115 I ActivityManager: Process com.tg.anti (pid 4191) has died: fore TOP 
04-15 13:23:29.310   820   847 W zygote64: kill(-4191, 9) failed: No such process
04-15 13:23:29.311   820   847 I zygote64: Successfully killed process cgroup uid 10152 pid 4191 in 0ms
04-15 13:23:29.311   581   581 I Zygote  : Process 4191 exited due to signal (11)
04-15 13:23:29.327  1374  1374 I WallpaperService: engine resumed

手里的真机被判断成了模拟器

std::string AntiEmulator::check() {
    std::string result = "security";
    std::vector<std::string> list_of_files =
            {
                    "/boot/bstmods/vboxguest.ko",
                    "/boot/bstmods/vboxsf.ko",
                    "/dev/qemu_pipe",
                    "/dev/socket/qemud",
                    "/dev/socket/windroyed-audio",
                    "/dev/socket/windroyed-camera",
                    "/dev/socket/windroyed-gps",
                    "/dev/socket/windroyed-sensors",
                    "/dev/vboxguest"
            };
    for (auto file: list_of_files) {
        if (check_of_file(file) || dir(file)) {
            result = "checked";
        }
    }

    std::vector<std::string> list_of_props = {
            "ro.redfinger.server.enable",
            "androVM.vbox_dpi",
            "androVM.vbox_graph_mode"
    };

    for (auto prop: list_of_props) {
        if (check_of_prop(prop).find("redfinger") != std::string::npos) {
            result = "checked";
        }
    }

    LOGE("result: %s", result.c_str());
    return result;
}

看了下判断check_of_file(file) || dir(file) 上面9个路径都走进走个语句内了...
image

Add Android Emulator detection

You can add a simple android emulator detection against bluestacks by checking if one of the following files exist on the system.

"/data/.bluestacks.prop"
"/data/.bstconf.prop"
"/mnt/windows"
"/mnt/windows/BstSharedFolder"
"/mnt/prebundledapps/downloads/com.bluestacks.home.apk"
"/mnt/prebundledapps/bst_appdetails_bgptest"
"/system/priv-app/com.bluestacks.bstfolder.apk"

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.