• Introducing XDA Computing: Discussion zones for Hardware, Software, and more!    Check it out!

[APP][v1.10] VD Infos (Package: com.vitaodoidao.vdinfos)

Search This thread

George35000vr

Senior Member
Then, you can ignore that safely.
Do you mean adb debugging?
Adb debugging can't be detected precisely, you can ignore that too.
The thing is that some apps like PS Remote Play still detects something and wont open. My Bank app (Winbank) detects root although theres no magisk or root at all, your app confirms that. So that's why im after that thing that your app reports.
 

VD171

Senior Member
Jun 21, 2012
1,895
2
1,589
127.0.0.1
LG K10
Samsung Galaxy J7
The thing is that some apps like PS Remote Play still detects something and wont open. My Bank app (Winbank) detects root although theres no magisk or root at all, your app confirms that. So that's why im after that thing that your app reports.
Probably the app is detecting unlocked bootloader or custom rom.
 
  • Like
Reactions: RN9_G85

VD171

Senior Member
Jun 21, 2012
1,895
2
1,589
127.0.0.1
LG K10
Samsung Galaxy J7
🔟 New Release: Version 1.10

Download: https://forum.xda-developers.com/attachments/vd_infos-v1-10-apk.5371159/

Changelog:

- Updated target to Android 12 (SDK 31).
- Added protected permissions. (PS: you need this to be sure those permissions are NEVER given.)
- Added REGION section.
- Added TYPE section.
- Added BUILD DATE section.
- Added HOST section.
- Added SECURITY PATCH section.
- Added SYSTEM VERSION section.
- Added ANDROID VERSION section.
- Added MARKET NAME section.
- Added ENCRYPTION section.
- Added BOOTLOADER section.
- Added MEMORY section.
- Added KERNEL section.
- Added DEVICE NAME section.
- Increased HARDWARE section.
- Fixed PRODUCT section.
- Fixed SELINUX section and detection.
- Added other ways to read Bluetooth MAC.
- Added other ways to read Wi-Fi MAC.
- Added other ways to read BRAND.
- Added other ways to read DEVICE.
- Added other ways to read DISPLAY ID.
- Added other ways to read FINGERPRINT.
- Added other ways to read IMEI.
- Added other ways to read KEYS.
- Added other ways to read MANUFACTURER.
- Added other ways to read MODEL.
- Added other ways to read PRODUCT.
- Added other ways to read HARDWARE.
- Added other ways to read RADIO.
- Added other ways to read SERIAL.
- Added other ways to read Phone and SIM cards infos.
- Added multiple ways to read build and system properties.
- Added multiple ways to search for files.
- Added multiple ways to read files.
- Now detecting UNLOCKED bootloader in ROOT section.
- Increased search for LSPosed and LSPosed Manager.
- Increased search for MOUNT INFOS.
- Increased search for PATHS.
- Increased precision search inside /PROC.
- Heavily increased search inside /PROC.
- Suppressed some unwanted details from some detections.


Enjoy !
 

Top Liked Posts

  • There are no posts matching your filters.
  • 21
    (Para quem fala PORTUGUÊS, o próximo post está totalmente traduzido !)

    VD Infos v1.10

    vdinfos-en-001.jpg
    vdinfos-en-002.jpg

    As we all know, Android is a super powerful and super versatile operating system.​
    What nobody tells you is that all your personal details and confidential information are available for all your installed applications.​
    Protect yourself against these types of invasions of privacy is an obligation.​
    The VD Infos app reads several of these details and information to show you an example of what can be captured from your device in use.​
    NO ONE INFORMATION IS STORED, SENT OR TRANSMITTED TO ANY FILE OR SERVER.
    If you want, you can disallow usage of internet with a firewall, or you can just turn off the internet.​



    Why use it ?
    • Just for curious.
    • See your device informations.
    • Test your hooks and spoofs.

    Languages:
    • English
    • Portuguese

    What it can read ?
    • ULTRA ROOT CHECKER/DETECTOR.
    • ULTRA MAGISK CHECKER/DETECTOR.
    • ULTRA XPOSED CHECKER/DETECTOR.
    • ULTRA RIRU CHECKER/DETECTOR.
    • Simple Root Check (Fast and Quickly).
    • Check many ways to detect android emulators.
    • Check many ways to detect busybox, whale framework, taichi frameworks, xposedbridge, lsposed, edxposed, virtualxposed, vaexposed, exposed, quickxposed, sandvxposed, zhihuxposed, xhook, supersu, suhide, luckypatcher, deviceemulator, rootcloak, xprivacy, xprivacylua, ebxprivacy, titaniumbackup, deviceidmasker and others.
    • Read Bluetooth MAC and VISIBLE NAME.
    • Read bounded bluetooth devices.
    • Read radio/modem/baseband version.
    • Read the state of the BOOTLOADER.
    • Read device name.
    • Read phone infos: Market Name, Device, Brand, Model, Product, Display ID, Manufacturer, Hardware.
    • Read Android infos: Host, Type, Build Date and Android Version.
    • Read phone system: KERNEL, MEMORY, Security Patch and System Version.
    • Read encryption infos.
    • Read build keys.
    • Read REGION.
    • Read Advertising ID.
    • Detects currently Selinux configuration.
    • Read build properties.
    • Read Android ID.
    • Read GSF ID (Google Services Framework).
    • Read IMEI (of all SIMs).
    • Read FINGERPRINT.
    • Check many ways to read SERIAL number.
    • List ACCOUNTS.
    • List CALL LOGS.
    • Read User-Agent (http.agent and getUserAgentString).
    • List SIM informations (of all SIMs).
    • List PHONE informations.
    • List WIFI informations (like MAC, IP, NAME, DNS, DHCP and previously connected WIFIs).
    • List NETWORK informations (each one).
    • List RUNNING PROCESSES.
    • List RUNNING SERVICES.
    • List INSTALLED PACKAGES.
    • List INSTALLED APPLICATIONS.

    How to protect yourself ?

    Based on:

    Tested on:
    • Android 4.4.2: SDK 19
    • Android 4.4.4: SDK 19
    • Android 5.0.2: SDK 21
    • Android 5.1.1: SDK 22
    • Android 6.0: SDK 23
    • Android 7.0: SDK 24
    • Android 7.1.1: SDK 25
    • Android 7.1.2: SDK 25
    • Android 8.0.0: SDK 26
    • Android 8.1.0: SDK 27
    • Android 9.0: SDK 28
    • Android 10.0: SDK 29
    • Android 11.0: SDK 30

    Contacts:

    Disclaimer:
    • Use and distribute as you want and as you wish.

    Thanks to:

    Download and support:
    Version Information
    Current Version:
    1.10
    Release Date: 2021-July-29

    Created: 2019-October-29
    Last Updated: 2021-July-29
    6
    (For who speak PORTUGUESE ! Keep attention, reply in ENGLISH only !)
    (Para quem fala PORTUGUÊS ! Fique atento, responda apenas em INGLÊS !)



    VD Infos v1.10

    vdinfos-pt-001.jpg
    vdinfos-pt-002.jpg

    Como todos já sabemos, o Android é um sistema operacional super potente e super versátil.​
    O que ninguém conta para você, é que todos os seus detalhes pessoais e informações confidenciais, estão disponíveis para todos os seus aplicativos instalados.​
    Se proteger destes tipos de invasões de privacidade, é uma obrigação.​
    O app VD Informações lê vários destes detalhes e informações para expor para você um exemplo do que pode ser capturado do seu aparelho em uso.​
    NENHUMA INFORMAÇÃO É ARMAZENADA, ENVIADA OU TRANSMITIDA PARA NENHUM ARQUIVO OU SERVIDOR
    Se quiser, você pode desautorizar o uso da internet com um firewall, ou você pode simplesmente desligar a internet.​



    Por que usar?
    • Apenas por curiosidade.
    • Ver as informações do dispositivo.
    • Testar seus hooks e camuflagens.

    Línguas:
    • Inglês
    • Português

    O que ele pode ler ?
    • ULTRA ROOT DETECTOR (superusuário).
    • ULTRA MAGISK DETECTOR.
    • ULTRA XPOSED DETECTOR.
    • ULTRA RIRU DETECTOR.
    • Root Check simples (rápido e prático).
    • Checa várias maneiras para detectar emuladores android.
    • Checa várias maneiras para detectar o busybox, whale framework, taichi frameworks, xposedbridge, edxposed, virtualxposed, vaexposed, lsposed, exposed, quickxposed, sandvxposed, zhihuxposed, xhook, supersu, suhide, luckypatcher, deviceemulator, rootcloak, xprivacy, xprivacylua, ebxprivacy, titaniumbackup, deviceidmasker e outros.
    • Lê o Bluetooth MAC e NOME VISÍVEL.
    • Lê dispositivos bluetooth pareados.
    • Lê a versão do rádio/modem/baseband.
    • Lê o estado do BOOTLOADER.
    • Lê o nome do aparelho.
    • Lê os dados do aparelho: Nome de Mercado, Dispositivo, Marca, Modelo, Produto, Display ID, Fabricante, Hardware.
    • Lê os dados do Android: Host, Tipo, Data do Sistema e Versão do Android.
    • Lê os dados do Sistema: KERNEL, MEMÓRIA, Atualização de Segurança e Versão do Sistema.
    • Lê os dados da encriptação.
    • Lê as chaves da build.
    • Lê a REGIÃO.
    • Lê o Advertising ID.
    • Detecta a configuração atual do Selinux.
    • Lê as propriedades da build.
    • Lê o Android ID.
    • Lê o GSF ID (Google Sevices Framework).
    • Lê o IMEI (de todos os chips).
    • Lê a IMPRESSÃO DIGITAL de vários métodos.
    • Checa várias maneiras para ler o número SERIAL.
    • Lista as CONTAS.
    • Lista o HISTÓRICO DE LIGAÇÕES.
    • Lê o User-Agent (http.agent e getUserAgentString).
    • Lista as informações do CHIP (de todos os chips).
    • Lista as informações do TELEFONE.
    • Lista as informações do WIFI (como MAC, IP, NOME, DNS, DHCP e redes WIFI conectadas anteriormente).
    • Lista as informações das REDES (cada uma).
    • Lista os PROCESSOS EM EXECUÇÃO.
    • Lista os SERVIÇOS EM EXECUÇÃO.
    • Lista os PACOTES INSTALADOS.
    • Lista os APLICATIVOS INSTALADOS.

    Como se proteger ?

    Baseado em:

    Testado em:
    • Android 4.4.2: SDK 19
    • Android 4.4.4: SDK 19
    • Android 5.0.2: SDK 21
    • Android 5.1.1: SDK 22
    • Android 6.0: SDK 23
    • Android 7.0: SDK 24
    • Android 7.1.1: SDK 25
    • Android 7.1.2: SDK 25
    • Android 8.0.0: SDK 26
    • Android 8.1.0: SDK 27
    • Android 9.0: SDK 28
    • Android 10.0: SDK 29
    • Android 11.0: SDK 30

    Contatos:

    Licença:
    • Use e distribua da maneira que quiser e como você bem entender.

    Agradecimentos:

    Download e suporte:
    Informação da Versão
    Versão Atual:
    1.10
    Data de Lançamento: 2021-Julho-29

    Criação: 2019-Outubro-29
    Última Atualização: 2021-Julho-29
    3
    For now:

    - 2020-May-10: Reserve new Thread on XDA-Developers.
    - 2020-May-10: Post about in english.
    - 2020-May-10: Post about in portuguese.
    - 2020-May-11: Finish english translation.
    - 2020-May-11: Release version 1.04.
    - 2020-June-11: Improve root detection methods with counter of time, counter of tries to detect root and counter of root possibilities found.
    - 2020-June-12: Add loading message with details of actual action.
    - 2020-June-13: Implement function to read Advertising ID, Device, Brand, Model, Product, Hardware, Manufacturer and Keys. And other ways to read Fingerprint.
    - 2020-June-14: Implement background functions for to keep app responsive. And shown of actual running task.
    - 2020-June-15: Full handling of errors and exceptions with details of last action.
    - 2020-June-16: Improve system properties detections.
    - 2020-June-17: Improve functions to detect emulators.
    - 2020-June-18: Splitted buttons to read informtions of the device and to detect root.
    - 2020-June-18: Added button to copy results in text style and another button to save results to a file.
    - 2020-June-19: Implement function to read Build properties by many ways.
    - 2020-June-20: Implement function to detect xposed classes.
    - 2020-June-21: Reduce and compress APK size to less than 1MB.
    - 2020-June-22: Improve selinux detections.
    - 2020-June-23: Improve functions to detect root precisely.
    - 2020-June-24: Fully translated to english.
    - 2020-June-25: Improve functions to read Build properties precisely.
    - 2020-June-26: Splitted root detection into three methods: Basic, Advanced and Agressive.
    - 2020-June-27: Arrangement of variables and methods.
    - 2020-June-28: Tests on 4.4.4, 5.1.1 and 7.1.2.
    - 2020-June-29: Tests on 5.0.2, 7.1.1 and 8.1.0.
    - 2020-June-30: Unhappy toybox is not preinstalled on SDK 21 (5.0.2) and lowers. So, toybox binaries were included on apk. APK size is now 2.6MB. :(
    - 2020-July-01: Unhappy executables are not allowed on SDK 29 (Android 10). So, toybox binaries were included as shared object libraries.
    - 2020-July-02: Tests on SDK 19, SDK 21, SDK 22, SDK 23, SDK 24, SDK 25, SDK 26, SDK 27, SDK 28, SDK 29 and SDK 30. And on archs (abi's): x86, x86_64, armeabi-v7a and arm64-v8a.
    - 2020-July-03: Filtered some false positives and some unwanted results.
    - 2020-July-04: I hate 4th of july.
    - 2020-July-05: Release signed version 1.05.
    - 2020-July-10: Added all xposed classes names for detection.
    - 2020-July-11: Implemented function to detect xposed on stack trace of exceptions.
    - 2020-July-12: Implemented function to detect root on /dev.
    - 2020-July-13: Implemented function to detect xposed using dex class loader.
    - 2020-July-14: Implemented function to detect apps from sources of installed packages.
    - 2020-July-15: Supressed unwanted details of detected infos.
    - 2020-July-16: Heavily increased lists for detection of classes, applications/packages and files/binaries.
    - 2020-July-24: Added button to stop actual action.
    - 2020-July-25: Added action to expand and unexpand each content.
    - 2020-September-04: Added confirmation dialog before to stop actual action.
    - 2020-September-05: Splitted methods for root detection.
    - 2020-September-06: Release signed version 1.06.
    3
    New Release: Version 1.09

    Download: https://forum.xda-developers.com/attachments/vd_infos-v1-09-apk.5350409/

    Changelog:

    - Fixed target to Android 11 (SDK 30). Apk size is now 3,84 MB.
    - Fixed Save to File on Android 11 (SDK 30).
    - Supressed warning for permission MANAGE_EXTERNAL_STORAGE.
    - Updated Toybox to v0.8.5.
    - Set "Simple Root Check" as default.
    - Fixed DEVICE section.
    - Increased PRODUCT section.
    - Added DISPLAY ID section.
    - Increased BUILDs section.
    - Increased search inside /sdcard/Android/media.
    - Increased search for Magisk, Riru, EdXposed and LSPosed.
    - Heavily increased search for LSPosed.
    - Heavily increased search inside /data/adb.


    Enjoy !
    3
    New Release: Version 1.08

    Download: https://forum.xda-developers.com/attachments/vd_infos-v1-08-apk.5223217/

    Changelog:

    - Fully renamed from "VD Informations" to "VD Infos".
    - Fully renamed from "com.vitaodoidao.vdinformacoes" to "com.vitaodoidao.vdinfos".
    - Fully compatible with Android 11 (SDK 30). (Thanks to @doggydog2 and @batlayo)
    - Removed the app name from the home title.
    - Change the expression "Radio" to "Radio/Modem/Baseband".
    - Updated links to XDA.
    - Removed all string values from xml files.
    - Fixed open link in the menu list.
    - Result content reorganized.
    - Changed all long toasts to short.
    - Fixed exceptions for reading calls.
    - Fixed exceptions for reading WiFi.
    - Fixed exceptions for reading Radio/Modem/Baseband.
    - Supressed unwanted result for Android 9+ (SDK 29+): unknown SERIAL.
    - Unhappy app size increased to 3,12 MB due to the latest SDK and build tools.
    - Added option to do a SIMPLE Root Check (fast and quickly).
    - Fixed Save to File for Android 9 and Android 10.
    - Disabled button for Save to File if is on Android 11+ (SDK 30+).
    - Improved method of detection of Magisk TMPFS.
    - Improved try and catch for each method and parsing of fails or nulled results.
    - Added all LSposed classes names for detection.
    - Added all VirtualXposed classes names for detection.
    - Added search for /data/magisk_backup.
    - Improved search for folders, binaries and files inside /data/adb.
    - Improved search for folders, binaries and files inside /data/local.
    - Improved search for folders, binaries and files inside /sdcard/Android.
    - Improved search for folders, binaries and files inside /sbin/.magisk.
    - Improved functions of Riru detection.
    - Improved searching of folders, binaries and files.