XHUBERTH

XHUBERTH / NekoCheck

Public

Tracking of malware embedded into Nekogram

19
0
100% credibility
Found Apr 05, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Java
AI Summary

NekoCheck is an Android tool that monitors the Nekogram Telegram client to detect and alert users when their account details are secretly transmitted to an external bot.

How It Works

1
📱 Discover the hidden risk

You hear online that your Nekogram chat app might secretly send your user info and phone numbers to a bot.

2
🔍 Find the NekoCheck watcher

You come across this free tool that keeps an eye on Nekogram for sneaky data sends.

3
🛡️ Turn on the safety monitor

You add the watcher to your phone so it tracks Nekogram's actions quietly in the background.

4
⚙️ Set your watch preferences

You pick options like using fake info or repeating checks to catch more activity.

5
💬 Use Nekogram normally

You open the app, check for updates, sync cloud data, or view profiles as usual.

6
🚨 Get instant alerts

Pop-up notices and logs show exactly when and what data tries to sneak out.

Feel protected and aware

Now you know your data's status and can decide how to stay safe from hidden sends.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 19 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is NekoCheck?

NekoCheck is a Java LSPosed module for Android that tracks embedded malware in Nekogram Telegram clients, detecting when they exfiltrate user IDs and phone numbers to a bot. Triggers like update checks, cloud sync, or long-pressing profiles prompt silent sends via inline queries; the module alerts with toasts and logcat output, plus spoofs data or resets send guards via config file. It solves the problem of hidden tracking malware infrastructure in popular forks, letting you monitor without switching apps.

Why is it gaining traction?

Unlike broad malwarebytes tracking tools, it targets Nekogram-specific payloads with network hooks that catch all versions, including Google Play builds, and version-matched logging for precise diagnosis. Configurable spoofing and filter bypasses make it a hands-on malware tracking app for testing attack expansion, standing out in github tracking software for Telegram threats over generic object tracking github repos.

Who should use this?

Android power users stuck on infected Nekogram versions, especially +86 or +85x phone owners hit first. Security researchers dissecting tracking malware with import hashing or github tracking issues in messaging apps like whatsapp tracking alternatives.

Verdict

Solid niche tool at 19 stars and 1.0% credibility score—docs detail affected builds and configs well, but low maturity means test thoroughly before relying on it for production security.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.