Xposed-Modules-Repo / com.w2016.sensorfilter

传感器滤镜
21 stars 1 forks source link

Find Xposed #1

Open vivian8421 opened 2 years ago

vivian8421 commented 2 years ago

I wrote an app with the same function as you a few days ago. By intercepting sensormanage, or getdefaultsensor or callback function, normal apps can be used, but for apps that detect root, the xposed framework will be exposed. For example, Momo 4.0 1。 In this contradiction, most rogue apps will flash back directly when they detect xposed. They need to use maps scan in HMA to prevent native detection. However, some app blocking maps will also flash back. I hope the author can break through these problems. Thank you.

w2016561536 commented 2 years ago

Sorry, i haven’t learned that before But, could you fake a memory by modifying the kernel?

vivian8421 commented 2 years ago

By modifying some code at the system level, the exposed trace will be detected by native detection and the root will be exposed, resulting in flash back. At present, I prevent shaking by turning off the sensor in the source code of service call sensormanager.