Skip to content

Actinis/android-container-platform

ย 
ย 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

3 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Android Container Platform

A comprehensive Redroid-based Android container platform with complete device spoofing integration for bypassing modern integrity checks and detection systems.

๐Ÿš€ Features

Core Capabilities

  • Multi-Version Support: Android 11, 12, 13, and 14
  • Multi-Architecture: ARM64 and x86_64 support
  • Device Spoofing: Complete hardware fingerprint spoofing
  • Integrity Bypass: SafetyNet and Play Integrity bypass
  • GPS Injection: Real-time location spoofing with movement simulation
  • Root Detection Bypass: Advanced hiding techniques
  • Container Orchestration: Automated management and monitoring

Security Features

  • Play Integrity Fix: Latest bypass techniques for Google's integrity API
  • Tricky Store: Advanced keystore attestation bypass
  • Shamiko: Root hiding with comprehensive app targeting
  • Zygisk Next: Enhanced process isolation and modification
  • Build.prop Spoofing: Dynamic system property modification
  • Network Isolation: Proxy-ready traffic routing

Device Profiles

  • Samsung Galaxy S24: Latest flagship Android 14 profile
  • Google Pixel 8: Pure Android 14 experience
  • OnePlus 12: Performance-focused Android 14
  • Custom Profiles: Easy addition of new device configurations

๐Ÿ“ Project Structure

android-container-platform/
โ”œโ”€โ”€ docker/                          # Docker configurations
โ”‚   โ”œโ”€โ”€ android-11/
โ”‚   โ”‚   โ”œโ”€โ”€ arm64/Dockerfile
โ”‚   โ”‚   โ””โ”€โ”€ x86_64/Dockerfile
โ”‚   โ”œโ”€โ”€ android-12/
โ”‚   โ”‚   โ”œโ”€โ”€ arm64/Dockerfile
โ”‚   โ”‚   โ””โ”€โ”€ x86_64/Dockerfile
โ”‚   โ”œโ”€โ”€ android-13/
โ”‚   โ”‚   โ”œโ”€โ”€ arm64/Dockerfile
โ”‚   โ”‚   โ””โ”€โ”€ x86_64/Dockerfile
โ”‚   โ””โ”€โ”€ android-14/
โ”‚       โ”œโ”€โ”€ arm64/Dockerfile
โ”‚       โ””โ”€โ”€ x86_64/Dockerfile
โ”œโ”€โ”€ scripts/                         # Core system scripts
โ”‚   โ”œโ”€โ”€ android-setup.sh            # Device configuration script
โ”‚   โ”œโ”€โ”€ integrity-bypass.sh         # SafetyNet/Play Integrity bypass
โ”‚   โ”œโ”€โ”€ gps-injection.sh            # GPS spoofing and injection
โ”‚   โ””โ”€โ”€ container-orchestrator.py   # Container management
โ”œโ”€โ”€ modules/                         # Spoofing and bypass modules
โ”‚   โ”œโ”€โ”€ device-profiles/            # Device hardware profiles
โ”‚   โ”‚   โ”œโ”€โ”€ samsung_galaxy_s24.json
โ”‚   โ”‚   โ”œโ”€โ”€ google_pixel_8.json
โ”‚   โ”‚   โ”œโ”€โ”€ oneplus_12.json
โ”‚   โ”‚   โ””โ”€โ”€ build_prop_generator.py
โ”‚   โ”œโ”€โ”€ bypass-tools/               # Root and integrity bypass tools
โ”‚   โ”‚   โ”œโ”€โ”€ magisk_manager.py
โ”‚   โ”‚   โ””โ”€โ”€ xposed_installer.py
โ”‚   โ””โ”€โ”€ gps-injection/              # Location spoofing components
โ”œโ”€โ”€ health-checks/                   # Container health monitoring
โ”‚   โ””โ”€โ”€ android-health.sh
โ”œโ”€โ”€ docker-compose.yml              # Multi-container orchestration
โ””โ”€โ”€ README.md                       # This file

๐Ÿ›  Installation and Setup

Prerequisites

  • Docker and Docker Compose
  • KVM support (for hardware acceleration)
  • 16GB+ RAM recommended
  • 50GB+ free disk space

Quick Start

  1. Clone the repository:

    git clone https://github.com/your-org/android-container-platform.git
    cd android-container-platform
  2. Build all containers:

    docker-compose build
  3. Start the platform:

    docker-compose up -d
  4. Verify containers are running:

    docker-compose ps

Container Access

Once running, containers are accessible via ADB:

  • Android 14 ARM64: adb connect localhost:5555
  • Android 14 x86_64: adb connect localhost:5556
  • Android 13 ARM64: adb connect localhost:5557
  • Android 12 Gaming: adb connect localhost:5558

๐ŸŽฏ Usage Examples

Basic Container Management

# Start specific container
docker-compose up -d android-14-arm64

# View container logs
docker-compose logs -f android-14-arm64

# Execute commands in container
docker-compose exec android-14-arm64 bash

# Stop all containers
docker-compose down

Device Configuration

Containers automatically apply device spoofing on startup. To manually configure:

# Enter container
docker-compose exec android-14-arm64 bash

# Check spoofing status
/system/bin/android-setup.sh

# Verify integrity bypass
/system/bin/integrity-bypass.sh

# Set custom GPS location
set-location 37.7749 -122.4194 50.0 3.0

# Monitor GPS updates
gps-monitor

Health Monitoring

# Check container health
docker-compose exec android-14-arm64 /usr/local/bin/health-check.sh

# View health logs
docker-compose exec android-14-arm64 cat /var/log/android-health.log

๐Ÿ— Advanced Configuration

Custom Device Profiles

Create new device profiles in modules/device-profiles/:

{
  "device_name": "Custom Device",
  "manufacturer": "CustomOEM",
  "brand": "custombrand",
  "model": "CUSTOM-123",
  "android_version": "14",
  "build_fingerprint": "custom/fingerprint/here",
  "spoofing_config": {
    "imei_pattern": "35{13}",
    "serial_pattern": "CUST{8}"
  }
}

Generate build.prop file:

python3 modules/device-profiles/build_prop_generator.py custom_device.json custom.prop

GPS Location Profiles

Configure dynamic location movement:

# Set walking pattern between locations
echo "SET_LOCATION 40.7128 -74.0060" | nc -U /data/local/tmp/gps_socket
sleep 30
echo "SET_LOCATION 40.7580 -73.9855" | nc -U /data/local/tmp/gps_socket

Integrity Bypass Configuration

The platform includes multiple bypass layers:

  1. Play Integrity Fix: Automatically configured for each Android version
  2. Tricky Store: Hardware attestation bypass for advanced apps
  3. Shamiko: Root hiding with comprehensive app denylist
  4. System Properties: Build.prop modifications for security compliance

๐Ÿ”’ Security Features

Automatic Bypasses

  • โœ… SafetyNet Basic Integrity
  • โœ… SafetyNet CTS Profile Match
  • โœ… Play Integrity BASIC verdict
  • โœ… Play Integrity DEVICE verdict
  • โœ… Root detection (banking apps, games)
  • โœ… Developer options detection
  • โœ… USB debugging detection
  • โœ… Mock location detection

Supported App Categories

  • ๐Ÿฆ Banking Apps: Chase, Bank of America, Wells Fargo, PayPal
  • ๐ŸŽฎ Gaming Apps: Pokemon GO, Clash of Clans, Candy Crush
  • ๐Ÿ“บ Streaming: Netflix, Disney+, Hulu, Amazon Prime
  • ๐Ÿ’ผ Enterprise: Microsoft Office, Slack, Zoom, Citrix

๐Ÿ“Š Monitoring and Management

Container Health Checks

  • System service status monitoring
  • Integrity bypass verification
  • GPS service monitoring
  • Resource usage tracking
  • Network connectivity checks

Management Scripts

# Container orchestrator
python3 scripts/container-orchestrator.py create container1 config.json
python3 scripts/container-orchestrator.py list
python3 scripts/container-orchestrator.py monitor

# Magisk module management
python3 modules/bypass-tools/magisk_manager.py list
python3 modules/bypass-tools/magisk_manager.py create-bypass

# Xposed module management
python3 modules/bypass-tools/xposed_installer.py status
python3 modules/bypass-tools/xposed_installer.py install-privacy

โš ๏ธ Important Notes

Legal and Ethical Use

This platform is designed for:

  • โœ… Security research and testing
  • โœ… App compatibility testing
  • โœ… Development and debugging
  • โœ… Educational purposes
  • โœ… Privacy protection research

Performance Optimization

  • Enable KVM acceleration for better performance
  • Allocate sufficient RAM (4GB+ per container)
  • Use SSD storage for better I/O performance
  • Monitor resource usage with built-in health checks

Troubleshooting

Common issues and solutions:

  1. Container won't start:

    # Check Docker logs
    docker-compose logs android-14-arm64
    
    # Verify KVM support
    ls -la /dev/kvm
  2. ADB connection issues:

    # Reset ADB
    adb kill-server
    adb start-server
    adb connect localhost:5555
  3. Integrity bypass failing:

    # Check bypass status
    docker-compose exec android-14-arm64 /system/bin/integrity-bypass.sh
    
    # Restart integrity services
    docker-compose restart android-14-arm64

๐Ÿ”„ Updates and Maintenance

Updating Bypass Modules

Bypass techniques are regularly updated. To get the latest versions:

# Pull latest container images
docker-compose pull

# Rebuild with latest bypasses
docker-compose build --no-cache

# Restart with updated configurations
docker-compose down && docker-compose up -d

Adding New Android Versions

  1. Create new Dockerfile in docker/android-XX/
  2. Update device profiles for new version
  3. Test integrity bypasses
  4. Add to docker-compose.yml

๐Ÿค Contributing

Contributions are welcome! Areas of interest:

  • New device profiles
  • Updated bypass techniques
  • Performance improvements
  • Additional monitoring features
  • Documentation improvements

๐Ÿ“„ License

This project is released under the MIT License. See LICENSE file for details.


โš ๏ธ Disclaimer: This software is for educational and research purposes only. Users are responsible for complying with all applicable laws and terms of service. The authors are not responsible for any misuse of this software.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 62.9%
  • TypeScript 16.8%
  • Dockerfile 10.3%
  • Shell 9.1%
  • PLpgSQL 0.4%
  • HTML 0.3%
  • Makefile 0.2%