Skip to content
/ aet Public

Android emulation environment with painless setup and emulation/root detection resistance features.

License

Notifications You must be signed in to change notification settings

nixu-corp/aet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

80 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Android Emulation Toolkit (AET)

Table of contents

Description

The purpose of this software is to make the testing of Android applications in a virtual environment easier, by providing a script that hides the signs of the emulator. The toolkit has been upgraded and has now a root detection evasion module as well. It also includes a tool setup part that should be used when first using the software. It installs all the necessary tools and setups a basic unmodified environment.

Prerequisites

Are you not on Linux? Or are you having problems with the scripts? Check out the guide for manual setup

Getting Started

Clone the project:

$ cd ~/
$ git clone [email protected]:nixu-corp/aet.git
$ cd aet/

Set executable bit for all scripts and binaries:

$ sudo chmod -R +x *.sh
$ sudo chmod +x bin/mkbootfs

If you do not have sudo permission, just add bash before each command running a shell script.

Run setup script (See Setting up environment):

$ bin/setup-env.sh --create

After that you can fire up the emulator (See Running emulator):

$ bin/run-emulator.sh ~/android-sdk/ default-emulation-detection-evasion-avd

If everything is working, you can take a look at more examples: Examples

Documentation

The Wiki contains all the information needed.

You can also check out the Getting Started section.

Reporting issues

Use the issue tracker. Please check that the issue has not already been submitted!

Special thanks

osm0sis, for the mkbootfs project

Kimmo Linnavuo, for assisting in researching emulation detection

Timo Järventausta (@timojarv), for his useful comments about user-friendliness

Aaro Lehikoinen, for helping with testing and code review

Contact information

Name: Daniel Riissanen

Email: daniel.riissanen[ät]gmail.com

About

Android emulation environment with painless setup and emulation/root detection resistance features.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages