RytterMohn

RytterMohn / EnvScope

Public

EnvScope 是一个用于 Android 运行环境自检的 APK,重点探测 Frida、Xposed、LSPosed、EdXposed、Substrate、Riru、Zygisk/Magisk 等动态插桩、Hook 或模块化注入痕迹。 项目同时实现 Kotlin 层与 Native C++ 层检测。Kotlin 层负责包名、类加载、调用栈、环境变量、系统属性、端口、进程、挂载表等检查;Native 层负责已加载 so、导出符号、`/proc`、线程名、socket 和 `TracerPid` 的交叉检查。

10
6
100% credibility
Found May 06, 2026 at 10 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Kotlin
AI Summary

EnvScope is an Android app that scans your device's runtime environment to detect traces of dynamic hooking and instrumentation tools like Frida, Xposed, LSPosed, Magisk, and similar frameworks.

How It Works

1
📱 Discover EnvScope

You hear about this handy app that checks your Android phone for hidden signs of tampering or cheating tools.

2
⬇️ Get the App

You download the simple app file from the project page to your computer.

3
📲 Install on Your Phone

Transfer the file to your phone and install it, just like any other app from outside the store.

4
🔍 Run the Security Check

Open the app and tap to start scanning your phone's inner workings for any suspicious activity.

5
Watch It Work

The app quietly examines your phone's setup, threads, files, and connections in seconds, feeling fast and thorough.

6
📊 Review Your Results

See a clear report with risk levels from low to critical, showing if anything fishy was found.

Stay Secure

You now know if your phone is clean and safe, giving you peace of mind for gaming, banking, or daily use.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 10 to 10 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is EnvScope?

EnvScope is an Android APK built in Kotlin with native C++ that self-inspects your runtime for dynamic hooks like Frida, Xposed, LSPosed, or Magisk/Zygisk traces. It scans packages, ports, processes, tracerpid, loaded libraries, and system properties to detect injection signs, then outputs a risk score from critical to low. Sideload the debug APK for instant environment audits on any Android device.

Why is it gaining traction?

Dual Kotlin and native C++ layers cross-check everything from thread names to exported symbols, catching evasions that single-layer tools miss. Risk levels aggregate signals into actionable verdicts, and it probes Frida ports directly while parsing `/proc` for stealthy hooks. GitHub envscope appeals to devs needing thorough Android introspection without rooting or extra servers.

Who should use this?

Android security researchers verifying hook-free devices before pentests, app devs hardening against reverse engineering on Magisk setups, or forensics teams spotting Frida gadgets in the wild. Perfect for runtime integrity checks in CI/CD or field audits.

Verdict

At 10 stars and 1.0% credibility, EnvScope feels immature—light on tests and adoption—but bilingual docs and modern Kotlin/C++ make it a quick win for Android tracerpid hunting. Grab it for prototypes; watch for community growth before trusting in high-stakes work.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.