fzer0x

fzer0x / SentryRadio

Public

A professional Android forensic tool designed to detect, analyze, and map cellular network anomalies, including potential IMSI Catchers (Stingrays), cell site simulators, and suspicious network downgrades and Silent SMS.

36
0
69% credibility
Found Feb 08, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Kotlin
AI Summary

SentryRadio is an Android app that monitors cellular connections on rooted devices to detect potential IMSI catchers, network downgrades, and other radio anomalies with mapping and active blocking features.

How It Works

1
🔍 Hear about SentryRadio

You learn about this app that watches for sneaky fake cell towers trying to spy on your phone calls and location.

2
📱 Install the app

Download and add it to your phone that has special access unlocked for deeper checks.

3
🔓 Grant watch permissions

Let the app peek at your phone's radio signals and pop up big warnings even over other screens or on lock.

4
🛡️ Turn on threat shields

Flip switches to block weak old networks and unsecure connections automatically.

5
📊 View live dashboard

Watch real-time stats like signal power, nearby towers, and a threat meter that lights up if trouble's near.

6
🗺️ Explore the tower map

See an offline map with green marks for trusted towers and red flags for suspicious fakes not matching known spots.

Feel secure and alerted

Get vibration buzzes and full-screen warnings for dangers, review logs of blocked threats, and move safely knowing your phone is guarded.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 36 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is SentryRadio?

SentryRadio is a Kotlin-based Android app for professional Android application development focused on analyzing cellular networks in real-time. It detects IMSI catchers (Stingrays), fake cell towers, Silent SMS, and network downgrades by monitoring radio metrics like signal strength, PCI, and timing advance across dual SIMs. Users get forensic mapping on offline maps, PCAP exports for Wireshark, and active defenses like blocking 2G fallbacks.

Why is it gaining traction?

It stands out with system-level hardening via Magisk/KSU modules, dynamic CVE checks from NIST NVD, and panic mode for instant radio lockdowns—features rare in basic signal analyzers. Full-screen lock-screen alarms and automated recovery make threats impossible to miss, while API cross-checks with OpenCellID and BeaconDB flag rogue towers reliably. Devs dig the GitHub-integrated update overlays and encrypted API key storage.

Who should use this?

Security researchers testing Stingray deployments on rooted Android 10+ devices. Privacy enthusiasts in high-risk areas wanting to analyze and block cellular attacks. Forensic analysts needing PCAP dumps and tower verification without carrier tools.

Verdict

Grab it if you're rooted and serious about radio security—solid for niche use despite 23 stars signaling early maturity. Docs are thorough with changelogs, but watch the 0.699999988079071% credibility score; test thoroughly before production reliance. (198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.