RytterMohn

隐藏 Android 应用内 USB 连接与 USB 调试检测信号的 LSPosed/Xposed 模块。

18
7
69% credibility
Found May 07, 2026 at 18 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Kotlin
AI Summary

UsbDetectionBypass is an Android tool that hides USB connection and debugging signals from selected apps, enabling authorized testing and research on owned devices.

How It Works

1
🔍 Discover the tool

You hear about a handy helper that lets apps on your Android phone pretend no USB cable is plugged in, great for safe testing of apps you own.

2
📥 Download the file

Grab the ready-to-use app file from the project page on your computer.

3
📱 Install on phone

Move the file to your phone and add it using your phone's special setup tools.

4
⚙️ Turn it on

In your phone's helper manager, switch on the tool and choose the exact app you want to test.

5
🔄 Restart the app

Close and reopen the app you're testing, or restart your phone to let the magic start.

Testing works perfectly

The app now thinks no USB is connected and debugging is off, so your tests run smoothly without detections.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 18 to 18 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is UsbDetectionBypass?

UsbDetectionBypass is a Kotlin LSPosed/Xposed module for Android that conceals USB connections and debugging signals from specific apps, making them see a disconnected, non-debuggable state. It solves the problem of apps detecting USB debugging or data transfer like android usb datenübertragung aktivieren, letting you test protections without triggering alerts. Install the APK on a rooted device, scope it via LSPosed, and verify via adb logcat on android github source setups.

Why is it gaining traction?

It covers Java APIs, broadcasts, shell commands, and native sysfs reads comprehensively, unlike partial bypasses, ensuring apps miss USB tethering or stick detection entirely. Scoped per-app activation with bilingual docs and Gradle builds via android github actions build appeals to tinkerers using android github codespaces or copilot. Logs hit every hook, making debugging straightforward.

Who should use this?

Android pentesters evading banking app USB checks during android usb debugging aktivieren tests. Security researchers simulating clean environments for reverse engineering. Rooted device owners bypassing android usb einstellungen or freigabe detections in custom ROMs.

Verdict

At 18 stars and 0.7% credibility score, it's immature but functional for niche USB evasion—docs are clear, tests basic, and it builds cleanly from android github source code. Grab it from the repo if you're in targeted pentesting; skip for production.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.