Skip to content

Latest commit

 

History

History
97 lines (71 loc) · 2.83 KB

README.md

File metadata and controls

97 lines (71 loc) · 2.83 KB

Android Emulation Toolkit (AET)

Table of contents

Description

The purpose of this software is to make the testing of Android applications in a virtual environment easier, by providing a script that hides the signs of the emulator. The toolkit has been upgraded and has now a root detection evasion module as well. It also includes a tool setup part that should be used when first using the software. It installs all the necessary tools and setups a basic unmodified environment.

Prerequisites

Are you not on Linux? Or are you having problems with the scripts? Check out the guide for manual setup

Getting Started

Clone the project:

$ cd ~/
$ git clone [email protected]:nixu-corp/aet.git
$ cd aet/

Set executable bit for all scripts and binaries:

$ sudo chmod -R +x *.sh
$ sudo chmod +x bin/mkbootfs

If you do not have sudo permission, just add bash before each command running a shell script.

Run setup script (See Setting up environment):

$ bin/setup-env.sh --create

After that you can fire up the emulator (See Running emulator):

$ bin/run-emulator.sh ~/android-sdk/ default-emulation-detection-evasion-avd

If everything is working, you can take a look at more examples: Examples

Documentation

The Wiki contains all the information needed.

You can also check out the Getting Started section.

Reporting issues

Use the issue tracker. Please check that the issue has not already been submitted!

Special thanks

osm0sis, for the mkbootfs project

Kimmo Linnavuo, for assisting in researching emulation detection

Timo Järventausta (@timojarv), for his useful comments about user-friendliness

Aaro Lehikoinen, for helping with testing and code review

Contact information

Name: Daniel Riissanen

Email: daniel.riissanen[ät]gmail.com