/
bypass_framgia_emulator.js
49 lines (47 loc) · 1.43 KB
/
bypass_framgia_emulator.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
/** This script create by Shino, member of ReUTD sercurity team. */
Java.perform(function () {
console.log("[.] Test bypass Emulator Detect");
var EmulatorDetector = Java.use('com.framgia.android.emulator.EmulatorDetector');
EmulatorDetector.detect.implementation = function () {
return false;
};
EmulatorDetector.checkBasic.implementation = function () {
return false;
};
EmulatorDetector.checkAdvanced.implementation = function () {
return false;
};
EmulatorDetector.checkPackageName.implementation = function () {
return false;
};
EmulatorDetector.checkTelephony.implementation = function () {
return false;
};
EmulatorDetector.checkPhoneNumber.implementation = function () {
return false;
};
EmulatorDetector.checkDeviceId.implementation = function () {
return false;
};
EmulatorDetector.checkImsi.implementation = function () {
return false;
};
EmulatorDetector.checkOperatorNameAndroid.implementation = function () {
return false;
};
EmulatorDetector.checkQEmuDrivers.implementation = function () {
return false;
};
EmulatorDetector.checkFiles.implementation = function () {
return false;
};
EmulatorDetector.checkQEmuProps.implementation = function () {
return false;
};
EmulatorDetector.checkIp.implementation = function () {
return false;
};
EmulatorDetector.isSupportTelePhony.implementation = function () {
return true;
};
});