voicon / fake-android

Android real device, cloud phone, simulator for group control of multiple devices. Avoid anti-bot system detection. Support RPC, NAT traversal.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

🐭 Fake Android, all for bots 🤖


😎 Join the discussion and let's discover fun things together: All-For-Bots


Reverse engineering is not easy, and I would appreciate if you could give a ⭐!


Technical details

My goal is not to be detected by the anti-bot system / risk control system, but after the device is rooted, the target app can easily get the underlying system information and detect whether it is being injected, and the common xposed-like hook solution definitely cannot bypass the detection.

So we can only choose non-rooted system.

After a lot of testings, I found that the UI-automator comes with Android system can reach my requirements well and can't be identified.

I have made many changes and integrated the following open source libraries:

repo details
uiautomator2 Wrapping uiautomator interface using python. I modified this code to make the communication much more efficient and to make it support remote connections.
atx-agent Android-side service program. I made it possible to run on non-root devices and support remote command calls.
weditor Desktop side control interface for easy recording of control scripts. I made it support remote device control.
sekiro Implement NAT traversal. I use this framework, combined with gRPC to complete the group control feature of remote devices.

About

Android real device, cloud phone, simulator for group control of multiple devices. Avoid anti-bot system detection. Support RPC, NAT traversal.

License:GNU General Public License v3.0


Languages

Language:Python 98.2%Language:HTML 1.7%Language:Java 0.1%Language:Batchfile 0.0%