A comprehensive Redroid-based Android container platform with complete device spoofing integration for bypassing modern integrity checks and detection systems.
- Multi-Version Support: Android 11, 12, 13, and 14
- Multi-Architecture: ARM64 and x86_64 support
- Device Spoofing: Complete hardware fingerprint spoofing
- Integrity Bypass: SafetyNet and Play Integrity bypass
- GPS Injection: Real-time location spoofing with movement simulation
- Root Detection Bypass: Advanced hiding techniques
- Container Orchestration: Automated management and monitoring
- Play Integrity Fix: Latest bypass techniques for Google's integrity API
- Tricky Store: Advanced keystore attestation bypass
- Shamiko: Root hiding with comprehensive app targeting
- Zygisk Next: Enhanced process isolation and modification
- Build.prop Spoofing: Dynamic system property modification
- Network Isolation: Proxy-ready traffic routing
- Samsung Galaxy S24: Latest flagship Android 14 profile
- Google Pixel 8: Pure Android 14 experience
- OnePlus 12: Performance-focused Android 14
- Custom Profiles: Easy addition of new device configurations
android-container-platform/
โโโ docker/ # Docker configurations
โ โโโ android-11/
โ โ โโโ arm64/Dockerfile
โ โ โโโ x86_64/Dockerfile
โ โโโ android-12/
โ โ โโโ arm64/Dockerfile
โ โ โโโ x86_64/Dockerfile
โ โโโ android-13/
โ โ โโโ arm64/Dockerfile
โ โ โโโ x86_64/Dockerfile
โ โโโ android-14/
โ โโโ arm64/Dockerfile
โ โโโ x86_64/Dockerfile
โโโ scripts/ # Core system scripts
โ โโโ android-setup.sh # Device configuration script
โ โโโ integrity-bypass.sh # SafetyNet/Play Integrity bypass
โ โโโ gps-injection.sh # GPS spoofing and injection
โ โโโ container-orchestrator.py # Container management
โโโ modules/ # Spoofing and bypass modules
โ โโโ device-profiles/ # Device hardware profiles
โ โ โโโ samsung_galaxy_s24.json
โ โ โโโ google_pixel_8.json
โ โ โโโ oneplus_12.json
โ โ โโโ build_prop_generator.py
โ โโโ bypass-tools/ # Root and integrity bypass tools
โ โ โโโ magisk_manager.py
โ โ โโโ xposed_installer.py
โ โโโ gps-injection/ # Location spoofing components
โโโ health-checks/ # Container health monitoring
โ โโโ android-health.sh
โโโ docker-compose.yml # Multi-container orchestration
โโโ README.md # This file
- Docker and Docker Compose
- KVM support (for hardware acceleration)
- 16GB+ RAM recommended
- 50GB+ free disk space
-
Clone the repository:
git clone https://github.com/your-org/android-container-platform.git cd android-container-platform -
Build all containers:
docker-compose build
-
Start the platform:
docker-compose up -d
-
Verify containers are running:
docker-compose ps
Once running, containers are accessible via ADB:
- Android 14 ARM64:
adb connect localhost:5555 - Android 14 x86_64:
adb connect localhost:5556 - Android 13 ARM64:
adb connect localhost:5557 - Android 12 Gaming:
adb connect localhost:5558
# Start specific container
docker-compose up -d android-14-arm64
# View container logs
docker-compose logs -f android-14-arm64
# Execute commands in container
docker-compose exec android-14-arm64 bash
# Stop all containers
docker-compose downContainers automatically apply device spoofing on startup. To manually configure:
# Enter container
docker-compose exec android-14-arm64 bash
# Check spoofing status
/system/bin/android-setup.sh
# Verify integrity bypass
/system/bin/integrity-bypass.sh
# Set custom GPS location
set-location 37.7749 -122.4194 50.0 3.0
# Monitor GPS updates
gps-monitor# Check container health
docker-compose exec android-14-arm64 /usr/local/bin/health-check.sh
# View health logs
docker-compose exec android-14-arm64 cat /var/log/android-health.logCreate new device profiles in modules/device-profiles/:
{
"device_name": "Custom Device",
"manufacturer": "CustomOEM",
"brand": "custombrand",
"model": "CUSTOM-123",
"android_version": "14",
"build_fingerprint": "custom/fingerprint/here",
"spoofing_config": {
"imei_pattern": "35{13}",
"serial_pattern": "CUST{8}"
}
}Generate build.prop file:
python3 modules/device-profiles/build_prop_generator.py custom_device.json custom.propConfigure dynamic location movement:
# Set walking pattern between locations
echo "SET_LOCATION 40.7128 -74.0060" | nc -U /data/local/tmp/gps_socket
sleep 30
echo "SET_LOCATION 40.7580 -73.9855" | nc -U /data/local/tmp/gps_socketThe platform includes multiple bypass layers:
- Play Integrity Fix: Automatically configured for each Android version
- Tricky Store: Hardware attestation bypass for advanced apps
- Shamiko: Root hiding with comprehensive app denylist
- System Properties: Build.prop modifications for security compliance
- โ SafetyNet Basic Integrity
- โ SafetyNet CTS Profile Match
- โ Play Integrity BASIC verdict
- โ Play Integrity DEVICE verdict
- โ Root detection (banking apps, games)
- โ Developer options detection
- โ USB debugging detection
- โ Mock location detection
- ๐ฆ Banking Apps: Chase, Bank of America, Wells Fargo, PayPal
- ๐ฎ Gaming Apps: Pokemon GO, Clash of Clans, Candy Crush
- ๐บ Streaming: Netflix, Disney+, Hulu, Amazon Prime
- ๐ผ Enterprise: Microsoft Office, Slack, Zoom, Citrix
- System service status monitoring
- Integrity bypass verification
- GPS service monitoring
- Resource usage tracking
- Network connectivity checks
# Container orchestrator
python3 scripts/container-orchestrator.py create container1 config.json
python3 scripts/container-orchestrator.py list
python3 scripts/container-orchestrator.py monitor
# Magisk module management
python3 modules/bypass-tools/magisk_manager.py list
python3 modules/bypass-tools/magisk_manager.py create-bypass
# Xposed module management
python3 modules/bypass-tools/xposed_installer.py status
python3 modules/bypass-tools/xposed_installer.py install-privacyThis platform is designed for:
- โ Security research and testing
- โ App compatibility testing
- โ Development and debugging
- โ Educational purposes
- โ Privacy protection research
- Enable KVM acceleration for better performance
- Allocate sufficient RAM (4GB+ per container)
- Use SSD storage for better I/O performance
- Monitor resource usage with built-in health checks
Common issues and solutions:
-
Container won't start:
# Check Docker logs docker-compose logs android-14-arm64 # Verify KVM support ls -la /dev/kvm
-
ADB connection issues:
# Reset ADB adb kill-server adb start-server adb connect localhost:5555 -
Integrity bypass failing:
# Check bypass status docker-compose exec android-14-arm64 /system/bin/integrity-bypass.sh # Restart integrity services docker-compose restart android-14-arm64
Bypass techniques are regularly updated. To get the latest versions:
# Pull latest container images
docker-compose pull
# Rebuild with latest bypasses
docker-compose build --no-cache
# Restart with updated configurations
docker-compose down && docker-compose up -d- Create new Dockerfile in
docker/android-XX/ - Update device profiles for new version
- Test integrity bypasses
- Add to docker-compose.yml
Contributions are welcome! Areas of interest:
- New device profiles
- Updated bypass techniques
- Performance improvements
- Additional monitoring features
- Documentation improvements
This project is released under the MIT License. See LICENSE file for details.