/

Getting started with Monitor on Android

An autonomous security agent that lives inside your Android application, with full visibility into runtime state, device integrity, and application behavior.

An autonomous security agent that lives inside your Android application, detecting and responding to threats in real-time with full visibility into device state, runtime behavior, and application integrity.


What is ByteHide Monitor?

Your Android application runs on devices you do not control. Attackers decompile, debug, hook, and manipulate your application directly on hardware they own. Traditional perimeter security cannot help here because there is no perimeter.

ByteHide Monitor is an autonomous security agent that runs inside your application as a parallel process, with full visibility into the runtime environment. It detects reverse engineering attempts, compromised devices, memory dumping, process injection, network tampering, and integrity violations. Because it operates inside the application, it can detect threats that no external tool can see, including zero-day techniques using behavioral analysis rather than signature matching.

Key characteristics:

  • Cloud-Managed: Configure protections from the ByteHide dashboard, applied at runtime
  • Java and Kotlin: Full support for both languages
  • Gradle Integration: Simple dependency setup via Maven repository
  • Zero Code Required: Cloud configuration mode requires no code changes

Quick Start

Quick Start

Get Monitor running in under 5 minutes with zero-config cloud setup

Gradle Setup

Add the Maven repository and Gradle dependency to your project

Configuration API

Cloud, JSON, and programmatic configuration options

Protection Modules

13 runtime protections for mobile threat detection


Available Protections

Monitor detects and prevents threats in real-time on Android devices:

ProtectionDescription
Debugger DetectionBlock LLDB, Android Studio Debugger, Frida
Root DetectionDetect Magisk, Xposed, SuperSU, and other root tools
Emulator DetectionIdentify Android Emulator, Genymotion, BlueStacks
Tampering DetectionVerify APK signature and code integrity
Clock TamperingDetect system time manipulation
Memory Dump DetectionBlock GameGuardian, memory scanning tools
Virtual Machine DetectionIdentify VMware, VirtualBox, QEMU
Process InjectionDetect code injection and hooking
Network TamperingIdentify MITM proxies (Charles, Burp Suite)
License BindingValidate device-bound licensing
Container DetectionIdentify containerized environments
Remote DesktopDetect remote control sessions
Cloud MetadataIdentify cloud infrastructure execution

Anomaly Detection is also active by default, learning your app's normal behavior and flagging deviations.


How It Works

  1. Add the Dependency: Add ByteHide Monitor via Gradle
  2. Configure Protections: Use cloud dashboard, JSON file, or programmatic API
  3. Deploy: Monitor activates at runtime and enforces protections
  4. Monitor: View incidents, devices, and sessions from the cloud panel

Changes made in the dashboard take effect without rebuilding your app.