root-detection
There are 16 repositories under root-detection topic.
talsec/Free-RASP-Android
Library for improving app security and threat monitoring on Android mobile devices.
user1342/DISintegrity
A tool for analysing Android APKs and extracting root, integrity, and tamper detection checks.
securevale/android-rasp
RASP (Runtime Application Self-Protection) solution for protecting Android apps against being run on vulnerable devices.
anish-adm/trust_fall
A Flutter plugin for detecting the trust fall of the device(Jailbroken, root, emulator and mock location detection).
rajivshah3/react-native-google-safetynet
React Native implementation for Google's SafetyNet API
OWASP/mas-crackmes
The MAS Crackmes aka. UnCrackable Apps, a collection of mobile reverse engineering challenges part of the OWASP MAS project.
m1r3x/Native-Anti-Tamper
An android project implementing magisk, frida and debugger detection using native library
mtaghavian/simple-banking
Simple full-stack banking application named "Wallet" using Spring Boot and Android
user1342/RUNIC
📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems such as Google Play SafetyNet and Huawei Safety Detect.
nsNeruno/magisk_detector
Flutter Support for integrating Magisk Detector for Android Application. Based from MagiskDetector.
ImKKingshuk/RootShield
RootShield : The Ultimate Shield for Rooted Android Devices - Protect your rooted Android device from unauthorized file operations and process executions! 🛡️ RootShield is a powerful kernel module that ensures your device remains secure by monitoring and preventing risky activities. RootShield is your device’s ultimate defense mechanism. 🛠️🔥
ByteV1610/rootkiller
rootkiller is a executable tool designed to enhance the security of game hack plugins for android
yakupaslantas/rootchecker
Simple tool to check if android device is rooted
jcunow/jcunow
CV & Resources of Johannes Cunow
sweathkumar/androidRootDeduction
Android root detection is crucial for securing applications against unauthorized access. It involves checking for root binaries, identifying suspicious apps like Magisk, and verifying system integrity. Implementing these checks helps protect sensitive data and maintain security.
zzril/detect-root
Check if other apps can detect your device being rooted.