Appteka Logo
Appteka
MockLocationDetector app icon

MockLocationDetector

Verified safe
ExclusiveOpen sourceToolsPsychopathRate this app
v2.0.0 (2)
Published Apr 17, 2026
Download APK
1.18 MB
Android 6.0+
35
arm64-v8a, armeabi-v7a, x86, x86_64
Screenshots
MockLocationDetector screenshot 1
What's New
⚠️ Important: Installation Notice Due to a change in the signing certificate, v2.0.0 is not compatible with a direct update from v1.0.0. To ensure a smooth transition, please follow these steps: 1. Uninstall the previous version (v1.0.0) from your system. 2. Download and install the new v2.0.0 package. Note: A clean install is required for this update only. Update Recommendation Because of the improved detection capabilities and overall stability, this update is highly recommended.
Description
An Android app that detects mock locations (GPS spoofing) using multiple techniques. Helps developers and privacy‑conscious users verify if the device’s location is genuine. Features - 🔍 Detects mock location through 4 different methods - 📱 Modern UI built with Jetpack Compose - 🧪 Shows detailed results for each detection technique - 🔐 Handles location permissions gracefully Detection Methods The app runs the following checks when you tap Run Detection: - AppOpsManager Checks whether any installed app has the ACCESS_MOCK_LOCATION permission and is allowed to inject mock locations. - Settings.Secure Reads the deprecated mock_location system setting; a non-zero value indicates that mock locations are enabled. - Location object Inspects the current location returned by FusedLocationProviderClient, including: - isFromMockProvider() [deprecated] - isMock() on API 31+ - extras bundle flag mockLocation - Hook detection Verifies that common Location fields such as provider, extras, and isMock have not been tampered with by runtime hooks. Bypassing Detection Detection can be reduced to zero by using the HideMockLocation Xposed module. To achieve this, ensure that you include System Framework and Settings Storage in the module's scope within your Xposed manager (e.g., LSPosed). How It Works 1. The app requests coarse/fine location permissions. 2. When you press Run Detection: - It checks all installed packages for mock location privileges (AppOpsManager). - It reads the secure settings for the legacy mock_location flag. - It fetches the current location using Google Play Services’ FusedLocationProviderClient. - It analyses the returned Location object for mock indicators. - It performs hook detection by creating a test Location and verifying expected behaviour. 3. Results are displayed in a scrollable list, with red icons indicating a mock location was detected. Permissions - ACCESS_COARSE_LOCATION – approximate location for detection (balanced power/accuracy). - ACCESS_FINE_LOCATION – precise location (required for high‑accuracy checks). - QUERY_ALL_PACKAGES – needed to enumerate all installed apps and check their declared permissions. The app does not store or transmit any location data. All processing is done on‑device. License MIT License
Rate this app
0 / 1000
Optional for 4–5 stars. Required for 1–3 stars (min 10 characters).
Ratings & reviews
No reviews yet.