Android Native Guard is a proof of concepts on how to detect various threat that might harm your application's integrity.
Android Native Guard used what's called Secure API
and low-level function call through inline syscall
to prevent any bypass that could potentially break the security system.
Android Native Guard used various open-source projects to implement a true-secure android application system.
- Debugger Detection
- Frida Detection
- Riru & Zygisk Detection
- Root Detection
- Memory Access & Dump Detection
- Library Patch & Hook Detection
- Better documentation (codes & README)
- App Tamper Detection (signature, checksum, etc)
- Magisk-Hide Detection Module (e.g. Shamiko)
- Blacklist for AntiLibPatch module
- Don't forget to add
android:extractNativeLibs="true"
to yourAndroidManifest.xml
so that module AntiLibPatch can work properly.
https://github.com/darvincisec/AntiDebugandMemoryDump