A simple Flutter app helps to detect suspicious apps like Magisk manager

Security Tester

Security Tester is built on top of applist_detector_flutter library. If you wish to improve any functionality, add fixes or learn how Security Tester works, See applist_detector_flutter .

The app contains a suit of simple additional offline tools like (Rootbeer, and Check if running on External Storage) you can use them in your app by navigating to the More Tools screen.

To learn more about contributions, See the contribution section.

This is not an officially supported Google product

Major Checks More Major Checks
Again Major Checks More Tools Dark Mode

Disclaimer

Security Tester is intended to be used by individuals to make it easy to secure your app for a large extend and it is NOT 100% bulletproof. Security Tester is not intended to be used for any illegal or malicious activities. Use it only for good purposes. I am not responsible for any damage caused by Security Tester.

Features

A very simple Flutter app helps to detect suspicious apps like Magisk manager, Xposed framework, Abnormal Environment, running emulator and much more.

Major Checks

These checks are borrowed from applist_detector_flutter and are the most important checks.

  • Search for suspicious files in filesystem.

  • Check for abnormal environment for running suspicious apps like Magisk, Riru, or Zygisk.

  • Check if the app is running on an emulator like Genymotion, Bluestacks, Windows subsystem for Android, etc.

Note: This feature is not 100% accurate. but it is more accurate than the other libraries like device_info_plus or safe_device.

  • Check if the Xposed framework is installed/used.

  • Play Integrity API checker which helps protect your apps and games from potentially risky and fraudulent interactions, such as cheating and unauthorized access, allowing you to respond with appropriate actions to prevent attacks and reduce abuse.

Additional Checks

These are minor checks and test for simple things like:

  • Check if the app is running on external storage.

  • Check if the app is running on a rooted device using Rootbeer.

  • Detect Hooks using simple checks borrowed from AntiDebug and jail-monkey .

  • Fetch the Telephone operator’s name.

  • View basic device info using device_info_plus.

  • View device CPI Info. See The /proc Filesystem

Usage

  • Security Tests Are a suit of offline tests and don’t need any internet connection.

  • Play Integrity API Is an online tool which needs to access the internet to be able to work. To learn more about Play Integrity, Check out the official docs.

    Note: Play Integrity API is only available for apps that are published on Google Play Store.

    To learn more about using the API when cloning this project, See the Play Integrity API section.

License

This library is distributed under Apache 2.0 license for more info see LICENSE DETAILS

GitHub

View Github