EasyProtector is a lightweight Android library that detects root access, debugging, emulators, virtual apps, and Xposed framework presence with minimal integration effort.
一行代码检测XP/调试/多开/模拟器/root
This tool is primarily used by Android app developers and security engineers to protect applications from tampering, debugging, and running in unauthorized environments such as rooted devices or emulators. It enables quick integration to enhance endpoint security by detecting common attack vectors and suspicious runtime conditions.
The project is currently not actively maintained due to resource constraints. It supports lazy loading to minimize permission requirements and initialization overhead. Users are encouraged to contribute via pull requests, especially for improving emulator detection. The library is compatible with Android API 16+ and supports both x86 and ARM architectures. No Proguard rules are needed for integration.
Add repositories in your build.gradle: jcenter(), maven(), google()
Add dependency in Gradle: implementation 'com.lahm.library:easy-protector-release:latest.release'
Or add Maven dependency with groupId 'com.lahm.library' and artifactId 'easy-protector-release' version '1.1.0'
Download the jar from the GitHub releases page if preferred
EasyProtectorLib.checkIsRoot();
Checks if the device is rooted.
EasyProtectorLib.checkIsDebug();
Detects if the app is being debugged.
EasyProtectorLib.checkIsPortUsing();
Checks if suspicious ports are in use.
EasyProtectorLib.checkXposedExistAndDisableIt();
Detects the presence of Xposed framework and attempts to disable it.
EasyProtectorLib.checkIsBeingTracedByC();
Detects if the app is being traced by native tools.
EasyProtectorLib.checkIsRunningInVirtualApk();
Detects if the app is running inside a virtual app container.
EasyProtectorLib.checkIsRunningInEmulator();
Detects if the app is running on an emulator.