com.w2016.sensorfilter icon indicating copy to clipboard operation
com.w2016.sensorfilter copied to clipboard

Find Xposed

Open vivian8421 opened this issue 3 years ago • 2 comments

I wrote an app with the same function as you a few days ago. By intercepting sensormanage, or getdefaultsensor or callback function, normal apps can be used, but for apps that detect root, the xposed framework will be exposed. For example, Momo 4.0 1。 In this contradiction, most rogue apps will flash back directly when they detect xposed. They need to use maps scan in HMA to prevent native detection. However, some app blocking maps will also flash back. I hope the author can break through these problems. Thank you.

vivian8421 avatar Dec 28 '21 00:12 vivian8421

Sorry, i haven’t learned that before But, could you fake a memory by modifying the kernel?

w2016561536 avatar Dec 29 '21 15:12 w2016561536

By modifying some code at the system level, the exposed trace will be detected by native detection and the root will be exposed, resulting in flash back. At present, I prevent shaking by turning off the sensor in the source code of service call sensormanager.

vivian8421 avatar Dec 31 '21 08:12 vivian8421