Andrea-lyz

隐藏Scene运行时的端口

78
104
69% credibility
Found May 01, 2026 at 78 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Shell
AI Summary

This repository provides a KernelSU module for rooted Android devices to hide TCP ports 8788 and 8765 used by the Scene app from bind and connect probes using eBPF and iptables.

How It Works

1
🔍 Discover the port hider

You learn about a tool that keeps your Scene app's special network doors (ports 8788 and 8765) hidden from scanners trying to detect it.

2
📱 Check your phone's readiness

You run a quick check on your rooted phone to see if it supports the hiding features needed, like looking for a special kernel file.

3
🔌 Connect phone to computer

You link your phone to your computer using a cable and pull a unique fingerprint file from your phone's system to make it custom-fit.

4
☁️ Upload to your online copy

You make a copy of the project online, upload your phone's fingerprint file there, so it builds perfectly for your device.

5
⚙️ Build your custom protector

The online builder uses your file to create a tailored package just for your phone, ensuring it works without issues.

6
📥 Download and install

You grab the ready-made package, put it on your phone, and install it through your root app manager, then restart your phone.

🎉 App stays hidden safely

You check the logs to confirm the ports are hidden, and your Scene app runs normally without anyone spotting its secret doors.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 78 to 78 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is Scene-Port-Hider-by-eBPF?

This Shell-based KernelSU module hides TCP ports 8788 and 8765 used by the Scene app (com.omarea.vtools) on rooted Android devices, blocking port probes via eBPF for bind calls and iptables for connect attempts. It solves detection by security scanners or apps sniffing for known Scene github android tools, letting Scene run stealthily. Users get a ready-to-flash zip that auto-starts on boot, with logs for verification.

Why is it gaining traction?

Unlike generic port hiders, it ties directly to your kernel's BTF for portable eBPF across devices, rejecting mismatched installs to avoid bootloops. GitHub Actions or one-line scripts build custom modules from your phone's BTF—no NDK hassle. Config tweaks ports or package names easily, standing out in scene script github and ebpf communities for rooted setups.

Who should use this?

Rooted Android 12+ users on arm64 with KernelSU, Magisk, or APatch running Scene for automation, who face port-based blocks in banking apps or firewalls. Ideal for tinkerers in github scene collective tweaking scene github apk without exposing services. Skip if your kernel lacks BTF or kprobes.

Verdict

Solid for niche Scene port hider needs—grab it if you match the requirements, but 78 stars and 0.699999988079071% credibility score signal early-stage maturity despite thorough docs. Self-build mandatory for reliability.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.