
Fechado
Publicado
Pago na entrega
I need an Android security specialist who can build a robust, native-layer root-detection module that reliably flags even the most recent Magisk tricks. The core logic must be written in C++ using the NDK, then surfaced to the app through a clean JNI bridge. Scope • Detect Magisk Hide, DenyList bypass, and Zygisk, even when the user tries to camouflage them. • Embed the most sensitive checks in C/C++ so they are harder to trace, patch, or repackage. • Provide lightweight Kotlin/Java wrappers only where absolutely necessary. Deliverables 1. Full source code (C/C++ plus any minimal Java/Kotlin glue). 2. Clear developer documentation that explains every detection technique and how to extend it. 3. A concise test report showing results on both rooted and non-rooted devices, with step-by-step reproduction notes. Acceptance • The demo APK must crash or show a blocked state on devices running Magisk (Hide, DenyList bypass, or Zygisk). • The same APK must run normally on an untouched, non-rooted device. • All code should compile with the latest stable Android NDK and be lint-clean. If you have previous work that showcases deep Magisk, SELinux, or kernel-level checks, let me know. I’m ready to start as soon as the technical approach is confirmed.
ID do Projeto: 40342561
51 propostas
Projeto remoto
Ativo há 10 dias
Defina seu orçamento e seu prazo
Seja pago pelo seu trabalho
Descreva sua proposta
É grátis para se inscrever e fazer ofertas em trabalhos
51 freelancers estão ofertando em média $2.032 USD for esse trabalho

With over 10 years of experience in Android development, including deep-rooted security solutions, I understand the critical need for an advanced Android root detection NDK module. Your project requires a robust, native-layer root-detection capability that can reliably flag the latest Magisk tricks. In the realm of Android security, I have successfully delivered projects similar to yours, showcasing my expertise in implementing complex detection techniques and building secure solutions. My experience in developing native Android applications, coupled with my knowledge of NDK and C++, positions me as the ideal candidate for this task. I am excited to collaborate with you on this project and deliver the high-quality results you seek. Let's discuss your requirements further and determine the technical approach needed to achieve your project goals. I am ready to commence work immediately once the technical details are finalized.
$2.400 USD em 30 dias
8,3
8,3

Hello, Developing a robust, native-layer root-detection module to flag even the latest Magisk tricks, implemented in C++ via NDK and surfaced through a clean JNI bridge, is a highly specialized task. This project demands deep expertise in Android security and low-level system understanding to ensure reliable and resilient protection. I’m Waqas from Eclairios, a professional software engineer with over 7 years of experience in app and web development. I have successfully completed 128 projects, earning a 5.0 rating from satisfied clients. I specialize in mobile apps (Android, iOS, Flutter), website development, custom APIs, and backend solutions. My goal is to deliver high-quality, scalable solutions that meet your business needs. Why hire me? ★ 100+ Projects Completed with 5-star rating. ★ 3 months of free post-launch support ★ Expertise in advanced technologies and systems Let’s connect and discuss how I can help you with your project. Best regards, Waqas
$1.851 USD em 7 dias
8,4
8,4

Drawing from a decade of experience and a talented team of 10, I believe I am the ideal candidate for your project. My deep knowledge and problem-solving abilities in C++ programming and mobile app development have given me the tools required to effectively execute this advanced Android Root Detection task. Not only do I value innovation, but my team and I are also committed to building powerful, lasting solutions. One of our key strengths at Web Crest is staying ahead of technology trends, making us an excellent choice when tackling cutting-edge projects such as yours. Our knack for AI automation aligns seamlessly with the complexity of your root-detection module needed. We understand that precise detection techniques are crucial, which is why we emphasize detailed documentation on each implemented technique and provide concise test reports for step-by-step reproduction. Moreover, our successful track record—98% project completion rate—combined with consistent positive client feedback speaks volumes about our reliability and ability to deliver quality work within agreed timelines. In the face of this demanding scope, you need a partner who not only understands technology but also its wider business impact—which is what my team offers. Let's get started so that we can demonstrate how we can meet all your project requirements professionally and effectively!
$1.500 USD em 7 dias
6,5
6,5

Hello there, I am excited about the opportunity to work on your project that requires an Android security specialist to develop a robust root-detection module specifically targeting the latest Magisk tricks. My approach will focus on writing core logic in C++ using the NDK and creating a clean JNI bridge for seamless integration into the app. The scope includes detecting Magisk Hide, DenyList bypass, and Zygisk, with a strong emphasis on embedding critical checks in C/C++ for enhanced security. I am committed to delivering comprehensive source code, detailed developer documentation, and a conclusive test report to ensure the effectiveness of the solution. If you have previous experience in similar projects, I would love to discuss further details and collaborate on this vital security endeavor. Regards, Yogesh Kumar
$2.370 USD em 8 dias
5,4
5,4

I can help you build this. The real challenge isn't detecting Magisk on a stock setup — it's surviving the cat-and-mouse game. Magisk updates frequently, and hardcoded artifact paths or package names go stale fast. So the detection engine needs to be technique-based, not signature-based. That means focusing on mount namespace inconsistencies, /proc anomalies, and syscall-level checks that are structurally hard to hide, rather than just grepping for "magisk" strings that get renamed every few months. One thing worth flagging: the spec says the app should "crash or show a blocked state" on rooted devices. Crashing is easy to trigger but also easy to fingerprint and patch out. A better pattern is to have the native layer return an encrypted detection verdict to the app logic, so an attacker can't just NOP out a single crash call. I'd recommend building it that way and letting you decide the response behavior on top. The C++ layer will use direct syscalls where possible instead of libc wrappers — this sidesteps LD_PRELOAD hooks that some bypass tools inject. Detection results get signed with an HMAC before crossing the JNI boundary so they can't be tampered with in Java/Kotlin land.
$1.500 USD em 15 dias
4,2
4,2

I recently finalized a native security suite for a high-risk financial app that successfully flagged stealth root environments where standard Java-based checks failed. My expertise lies in moving detection logic into the NDK layer using C++ to evade instrumentation hooks and dynamic analysis tools like Frida. By focusing on low-level system artifacts rather than just common file paths, I ensure the detection remains resilient against modern masking techniques like Magisk or KernelSU. My approach involves developing a custom C++ module that utilizes direct syscalls to bypass libc hooking, allowing for accurate verification of the filesystem and process environment. I will implement memory map analysis to scan for Zygisk-related modules and perform integrity checks on the system’s read-only properties to identify unauthorized mounts. To further harden the module, I will apply string obfuscation and symbol stripping within the native binary to make reverse engineering the logic significantly more difficult. This multi-layered strategy provides a robust defense-in-depth against both automated scripts and manual tampering. Are you planning to integrate this with Play Integrity for server-side attestation, or is the requirement strictly for a standalone, offline-first native module? I’m also curious if there are specific cloaking apps that your threat model prioritizes. I am available for a brief chat or a call to discuss the integration details and align on the specific security thresholds required for your project.
$2.475 USD em 21 dias
3,1
3,1

You asked for native C++ NDK checks that catch Magisk Hide, DenyList bypass and Zygisk even when camouflaged. Moving the most sensitive logic into C/C++ and exposing only a tiny JNI surface is exactly the right move. Insight: many recent Magisk tricks rely on manipulating mount namespaces and SELinux contexts to hide artifacts, so cross-checking /proc/self/mountinfo, /proc/<pid>/maps and SELinux state dramatically increases detection resilience beyond simple file checks. Proof: I built a C++ NDK root-detection module for a banking client that reliably detected Zygisk and DenyList evasions, produced a blocking demo APK on rooted devices, shipped full C/C++ source plus minimal JNI/Kotlin glue, and a device-by-device test report across Android 9–13. Approach: implement layered native checks (namespace/mount inconsistencies, procfs mapping anomalies, su/binaries + kernel symbol heuristics, inline syscall integrity checks) in C++, compile with the latest NDK, expose a minimal JNI wrapper, and deliver developer docs plus step-by-step reproduction tests. Kotlin/Java will only be used for the UI/reporting shim. Which Magisk versions and Android API levels should I prioritize for the demo? If that works I can jump on a 20-minute call to lock scope and start a PoC. Regards, Zweidevs
$2.250 USD em 7 dias
0,0
0,0

Hanoi, Vietnam
Método de pagamento verificado
Membro desde abr. 2, 2026
$10-30 USD
$750-1500 NZD
₹600-1500 INR
€30-250 EUR
₹600-1500 INR
$30-250 AUD
$30-250 USD
₹250000-500000 INR
₹37500-75000 INR
$10-30 USD
₹150000-250000 INR
₹1500-12500 INR
₹12500-37500 INR
₹1500-12500 INR
$1500-3000 USD
$250-750 USD
₹600-1500 INR
₹1250-2500 INR / hora
$10-30 USD
$30-35 USD