EasyProtector
EasyProtector copied to clipboard
一行代码检测XP/调试/多开/模拟器/root

以下为checkIsRunningInEmulator回调内容: Test start hardware = qcom flavor = aosp_shamu-user model = MI 9 manufacturer = Xiaomi board = Xiaomi platform = msm8084 baseBand = null sensorNumber = 9 userAppNumber =...
最近代码被hook了,想问下楼主有没有方法禁止hook
1.分身大师app包名 com.excean.maid 2.分身后app私有路径为 /data/user/0/com.excean.maid/gameplugins/x.x.x/files
1.多开分身包名为com.bly.dkplat 2.多开分身虚拟过的app filesDir 为 /data/user/0/dkplugin.ypx.okr/virtual/data/user/0/x.x.x/files/或/data/user/0/dkplugin.olx.aug/virtual/data/user/0/x.x.y/files 类似样式,每个应用中间路径不同,但都是以dkplugin打头和包含virtual, 这个可以兼容一下,其他分身工具的后续再补充

/data/user/0/io.virtual/virtual/data/user/0/com.demo/files
![Uploading image.png…]() 

虚拟定位
请问一下,楼主,能防止手机虚拟定位的吗?