Appteka Logo
Appteka
Duck Detector app icon

Duck Detector

Verified safe
v2026.05.20-38eb6fee7df5 (434)
Published May 21, 2026
Download APK
13.13 MB
Android 10.0+
33
arm64-v8a, armeabi-v7a, x86, x86_64
AI summary
Security inspection app that scans Android devices for root tampering, runtime hooking, mount manipulation, and virtualized environments. Uses native C++ and arm64 assembly probes alongside a Jetpack Compose UI for structured findings across 15+ detector modules including bootloader, LSPosed, Zygisk, and TEE attestation. Mostly offline; network only used for optional TEE revocation checks.
What's New
Nightly APK build.
Description
DuckDetector is an Android security inspection app focused on local, device-side evidence collection for root-related tampering, runtime hooking, mount manipulation, attestation trust, and virtualized execution environments. The project combines a Jetpack Compose UI, modular Kotlin feature packages, and native C++ / assembly probes to surface detector cards with structured findings, method coverage, and scan-state summaries. Highlights - Modular detector architecture with feature-specific repositories, mappers, view models, and card UIs. - Native startup preload through a transparent NativeActivity launcher for early mount and virtualization evidence collection. - Native runtime probes implemented in C++ and arm64 assembly where timing, syscall, or mount visibility matters. - Cross-process and isolated-process consistency checks for stronger runtime validation. - Dashboard aggregation with per-detector status, top findings, loading states, and detailed drill-down cards. - Mostly local, offline inspection. Network access is only used when the user allows online TEE revocation checks in Settings. Detector Modules The app includes these major detector areas: - Bootloader Checks bootloader unlock state and related security posture. - Custom ROM Checks ROM fingerprints, platform-file fallbacks, and ROM indicators. - Dangerous Apps Corroborates installed apps against known risky packages. - Kernel Check Looks for kernel build and runtime consistency signals. - LSPosed Checks for Java-side and native LSPosed or Xposed runtime evidence. - Memory Looks for runtime hook residue, suspicious mappings, and loader visibility. - Mount Inspects mount tables, mount consistency, startup preload findings, overlay signals, and namespace anomalies. - Native Root Checks native root-runtime traces, corroborated residue paths, and low-level system anomalies. - Play Integrity Fix Checks property spoofing and related runtime consistency signals. - SELinux Checks SELinux mode, policy, audit integrity, and context consistency. - SU Checks root binaries and runtime root-context indicators. - System Properties Checks property consistency, native snapshots, and raw property-area residue. - TEE Checks key attestation, certificate chain analysis, revocation, StrongBox, and RKP signals. - Virtualization Checks emulator, guest, translation, host-app, consistency, and honeypot evidence. - Zygisk Checks Zygisk state, FD traps, linker residue, and cross-process evidence. Supporting areas like dashboard, settings, and deviceinfo provide aggregation, user controls, and device context. License Apache 2.0
Rate this app
0 / 1000
Optional for 4–5 stars. Required for 1–3 stars (min 10 characters).
Ratings & reviews
No reviews yet.