Applist Detector Flutter
A Flutter ported library to detect suspicious apps like Magisk manager, Xposed framework, Abnormal Environment, running emulator and much more. Written in Kotlin and Dart.
This is not an officially supported Google product
Security Tester | |
---|---|
You can use our app Security Tester which is a direct UI implementation/Example for this library. |
Platform Support
Android | iOS | MacOS | Web | Linux | Windows |
---|---|---|---|---|---|
✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
Features
-
Check for suspicious files in the files in the system.
-
Check for suspicious Settings props like debug props, vpn usage, etc.
-
Check for abnormal environment for running suspicious apps like Magisk, Riru, or Zygisk.
-
Check if the app is running on an emulator like Genymotion, Bluestacks, Windows subsystem for android, etc.
Note: This feature is not 100% accurate. but it is more accurate than the other libraries like device_info_plus or safe_device.
-
Check if the Xposed framework is installed.
-
Play Integrity API Checker which helps protect your apps and games from potentially risky and fraudulent interactions, such as cheating and unauthorized access, allowing you to respond with appropriate actions to prevent attacks and reduce abuse.
Contribution
Feel free to contribute to this project by creating issues or pull requests. Any help is appreciated ❤️. Check out the CONTRIBUTING.md file for more info.
TODO
These are the features which we are planning to add in the future.
Credits
Disclaimer
This tool is intended to be used by individuals to make it easy to secure your app for a large extend and it is NOT 100% bulletproof. If you are looking for a 100% secure solution, this is not the right tool for you. This tool is not intended to be used for any illegal or malicious activities. Use it only for good purposes. I am not responsible for any damage caused by this tool.
License
This library is distributed under Apache 2.0 license for more info see LICENSE DETAILS