Adb shell
Author: t | 2025-04-24
adb install adb uninstall adb shell pm list packages adb shell pm path adb shell pm clear. File Manager adb pull adb push adb shell ls adb shell cd adb shell rm adb shell mkdir adb shell touch adb shell cat adb shell pwd adb shell cp adb shell mv. Network adb shell netstat adb shell ping adb shell netcfg adb shell ip.
Adb Shell Ping- Android ADB Shell Command
Acquired from and MacFly contain the: GPS Setter, GPS Joystick, and Hide Mock Location. MacFly demonstrated how the tool could be used to spoof the location of a particular modified coordinate, along with a victim’s pre-recorded route, which allows a threat actor to imitate a client in movement (e.g., driving in a taxi). During installation, HUNTER identified the following modules:adb push !workspace.novabackup /storage/emulated/0/ adb push data /storage/emulated/0 adb push 01_Busybox.zip /storage/emulated/0 adb push 02_Propsf.zip /storage/emulated/0/ adb push 03_ACC.zip /storage/emulated/0/ adb push 04_Font_Manager.zip /storage/emulated/0/ adb push 05_hide-usb-debugging.zip /storage/emulated/0/ adb push 06_Riru.zip /storage/emulated/0/ adb push 07_safetynet.zip /storage/emulated/0/ adb push 09_LSPosed.zip /storage/emulated/0/ adb push 10_momohider.zip /storage/emulated/0/ adb push 08_overlayfs.zip /storage/emulated/0/ adb push 11_riru-unshare_a10.zip /storage/emulated/0/ adb push 12_Storage.zip /storage/emulated/0/ adb push 12_sui.zip /storage/emulated/0/ adb push 13_AppDataIsolation.zip /storage/emulated/0/ adb push 14_liboemcrypto_disabler.zip /storage/emulated/0/ adb push 15_fakeencryption.zip /storage/emulated/0/ adb push 16_hidemodified_init.rc.zip /storage/emulated/0/ adb push 17_resetsensitiveprops.zip /storage/emulated/0/ adb push 18_BlockAds.zip /storage/emulated/0/ adb push 19_storage_iso.zip /storage/emulated/0/ adb push app-release.apk /storage/emulated/0/ adb push Hidemyapplist.json /storage/emulated/0/ adb push base.settings /storage/emulated/0/ adb push base_2.12_premium.settings /storage/emulated/0/ adb push LSPosed.lsp.gz /storage/emulated/0/ rem adb shell su -c pm disable com.coloros.phonemanager rem shell su -c pm disable com.oppo.ota rem shell su -c pm disable com.nearme.romupdate rem shell su -c pm disable com.coloros.sau adb shell su -c setenforce 1 adb shell su -c magisk --install-module /storage/emulated/0/01_Busybox.zip adb shell su -c magisk --install-module /storage/emulated/0/02_Propsf.zip adb shell su -c magisk --install-module /storage/emulated/0/03_ACC.zip adb shell su -c magisk --install-module /storage/emulated/0/04_Font_Manager.zip adb shell su -c magisk --install-module /storage/emulated/0/05_hide-usb-debugging.zip adb shell su -c magisk --install-module /storage/emulated/0/06_Riru.zip adb shell su -c magisk --install-module /storage/emulated/0/07_safetynet.zip adb shell su -c magisk --install-module /storage/emulated/0/09_LSPosed.zip adb shell su -c magisk --install-module /storage/emulated/0/10_momohider.zip adb shell su -c magisk --install-module /storage/emulated/0/11_riru-unshare_a10.zip adb shell su -c magisk --install-module /storage/emulated/0/12_Storage.zip adb shell su -c magisk --install-module /storage/emulated/0/08_overlayfs.zip adb shell su -c magisk --install-module /storage/emulated/0/12_sui.zip adb shell su -c magisk --install-module /storage/emulated/0/13_AppDataIsolation.zip adb shell su -c magisk --install-module /storage/emulated/0/14_liboemcrypto_disabler.zip adb shell su -c magisk --install-module /storage/emulated/0/15_fakeencryption.zip adb shell su -c magisk --install-module /storage/emulated/0/16_hidemodified_init.rc.zip adb shell su -c magisk --install-module /storage/emulated/0/17_resetsensitiveprops.zip adb shell su -c magisk --install-module /storage/emulated/0/18_BlockAds.zip adb shell su -c magisk --install-module /storage/emulated/0/19_storage_iso.zip echo press for end install pause adb shell su -c magiskhide add com.google.android.gms adb shell su -c magiskhide add com.google.android.gms.unstable adb shell su -c magiskhide add com.byxiaorun.detector adb shell rm /storage/emulated/0/01_Busybox.zip adb shell rm /storage/emulated/0/02_Propsf.zip adb shell rm /storage/emulated/0/03_ACC.zip adb shell rm /storage/emulated/0/04_Font_Manager.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.z adb shell rm /storage/emulated/0/06_Riru.zip adb shell rm /storage/emulated/0/07_safetynet.zip adb shell rm /storage/emulated/0/09_LSPosed.zip adb shell rm /storage/emulated/0/10_momohider.zip adb shell rm /storage/emulated/0/11_riru-unshare_a10.zip adb shell rm /storage/emulated/0/12_Storage.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.zip adb shell rm /storage/emulated/0/!workspace.novabackup adb shell rm /storage/emulated/0/08_overlayfs.zip adb shell rm /storage/emulated/0/12_sui.zip adb shell rm /storage/emulated/0/13_AppDataIsolation.zip adb shell rm /storage/emulated/0/14_liboemcrypto_disabler.zip adb shell rm /storage/emulated/0/15_fakeencryption.zip adb shell rm /storage/emulated/0/16_hidemodified_init.rc.zip adb shell rm /storage/emulated/0/19_storage_iso.zip adb shell rm /storage/emulated/0/18_BlockAds.zip adb shell rm /storage/emulated/0/17_resetsensitiveprops.zipThe actors deploy LSPosed, and HideMyApp (HMA), with configuration settings defined in the "Hidemyapplist.json" file. In addition to that, the package drops "base.settings" and "base_2.12_premium.settings" in encrypted form. Recovered "Hidemyapplist.json" by our reverse engineers contains the following list of supported applications from major online To upload them onto a device.app: additional softwareArchitecture (previously - Xposed) - unofficial Android framework made for changing codes of system apps ( the author of mobile antidetects uses fork Magisk Delta from HuskyDG - Magisk Delta contains a magiskhide module allowing to hide root from selected apps (which doesn't exist in the official package). The main differences between Magisk Delta from the official version of Magisk are provided below:InstallationTo install the solution on the device, you must first unlock the bootloader and install the driver to connect the device to the PC. Check the connection with the adb devices command.Go to the folder sideload Install MagiskDelta: app-release.apk, to get the root root. Подробнее that Magisk has been successfully installed and has the status Installed:Launch batch script !install.batContent of !install.bat: @echo offadb push !workspace.novabackup /storage/emulated/0/adb push data /storage/emulated/0adb push 01_Busybox.zip /storage/emulated/0 adb push 02_Propsf.zip /storage/emulated/0/adb push 03_ACC.zip /storage/emulated/0/adb push 04_Font_Manager.zip /storage/emulated/0/adb push 05_hide-usb-debugging.zip /storage/emulated/0/adb push 06_Riru.zip /storage/emulated/0/adb push 07_safetynet.zip /storage/emulated/0/adb push 09_LSPosed.zip /storage/emulated/0/adb push 10_momohider.zip /storage/emulated/0/adb push 08_overlayfs.zip /storage/emulated/0/adb push 11_riru-unshare_a10.zip /storage/emulated/0/adb push 12_Storage.zip /storage/emulated/0/adb push 12_sui.zip /storage/emulated/0/adb push 13_AppDataIsolation.zip /storage/emulated/0/adb push 14_liboemcrypto_disabler.zip /storage/emulated/0/adb push 15_fakeencryption.zip /storage/emulated/0/adb push 16_hidemodified_init.rc.zip /storage/emulated/0/adb push 17_resetsensitiveprops.zip /storage/emulated/0/adb push 18_BlockAds.zip /storage/emulated/0/adb push 19_storage_iso.zip /storage/emulated/0/adb push app-release.apk /storage/emulated/0/adb push Hidemyapplist.json /storage/emulated/0/adb push base.settings /storage/emulated/0/adb push base_2.12_premium.settings /storage/emulated/0/adb push LSPosed.lsp.gz /storage/emulated/0/rem adb shell su -c pm disable com.coloros.phonemanagerrem shell su -c pm disable com.oppo.otarem shell su -c pm disable com.nearme.romupdaterem shell su -c pm disable com.coloros.sauadb shell su -c setenforce 1adb shell su -c magisk --install-module /storage/emulated/0/01_Busybox.zip adb shell su -c magisk --install-module /storage/emulated/0/02_Propsf.zipadb shell su -c magisk --install-module /storage/emulated/0/03_ACC.zipadb shell su -c magisk --install-module /storage/emulated/0/04_Font_Manager.zipadb shell su -c magisk --install-module /storage/emulated/0/05_hide-usb-debugging.zipadb shell su -c magisk --install-module /storage/emulated/0/06_Riru.zipadb shell su -c magisk --install-module /storage/emulated/0/07_safetynet.zipadb shell su -c magisk --install-module /storage/emulated/0/09_LSPosed.zipadb shell su -c magisk --install-module /storage/emulated/0/10_momohider.zipadb shell su -c magisk --install-module /storage/emulated/0/11_riru-unshare_a10.zipadb shell su -c magisk --install-module /storage/emulated/0/12_Storage.zipadb shell su -c magisk --install-module /storage/emulated/0/08_overlayfs.zipadb shell su -c magisk --install-module /storage/emulated/0/12_sui.zipadb shell su -c magisk --install-module /storage/emulated/0/13_AppDataIsolation.zipadb shell su -c magisk --install-module /storage/emulated/0/14_liboemcrypto_disabler.zipadb shell su -c magisk --install-module /storage/emulated/0/15_fakeencryption.zipadb shell su -c magisk --install-module /storage/emulated/0/16_hidemodified_init.rc.zipadb shell su -c magisk --install-module /storage/emulated/0/17_resetsensitiveprops.zipadb shell su -c magisk --install-module /storage/emulated/0/18_BlockAds.zipadb shell su -c magisk --install-module /storage/emulated/0/19_storage_iso.zipecho press for end installpause adb shell su -c magiskhide add com.google.android.gms adb shell su -c magiskhide add com.google.android.gms.unstableadb shell su -c magiskhide add com.byxiaorun.detectoradb shell rm /storage/emulated/0/01_Busybox.zip adb shell rm /storage/emulated/0/02_Propsf.zip adb shell rm /storage/emulated/0/03_ACC.zip adb shell rm /storage/emulated/0/04_Font_Manager.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.zadb shell rm /storage/emulated/0/06_Riru.zip adb shell rm /storage/emulated/0/07_safetynet.zip adb shell rm /storage/emulated/0/09_LSPosed.zip adb shell rm /storage/emulated/0/10_momohider.zip adb shell rm /storage/emulated/0/11_riru-unshare_a10.zipadb shell rm /storage/emulated/0/12_Storage.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.zip adb shell rm /storage/emulated/0/!workspace.novabackup adb shell rm /storage/emulated/0/08_overlayfs.zipadb shell rm /storage/emulated/0/12_sui.zipadb shell rm /storage/emulated/0/13_AppDataIsolation.zipadb shell rm /storage/emulated/0/14_liboemcrypto_disabler.zipadb shell rm /storage/emulated/0/15_fakeencryption.zipadb shell rm /storage/emulated/0/16_hidemodified_init.rc.zipadb shell rm /storage/emulated/0/19_storage_iso.zipadb shell rm /storage/emulated/0/18_BlockAds.zipadb shell rm /storage/emulated/0/17_resetsensitiveprops.zipThis script will install all the necessary Magisk modules to the device. Note that not all paths used in the script correspond to the data in the sideload directory. Some are missing; others have changedAdb logcat commands - ADB Shell
How to Use ADB Commands to Bypass FRPDownload the latest ADB Installer setup file from the Internet.Run the adb-setup.exe and type ‘Y’ and follow the onscreen instructions to install the ADB and fastboot driver.Power on your device normally and connect it to your PC using USB cable.Go the folder where the adb drivers are installed. (In most cases they are installed in the C Drive (Windows Drive))Hold down Shift, right-click anywhere blank in the ADB folder, and select "Open command window here".To remove FRP on Samsung devices via ADB commands: Type the following ADB FRP bypass command into the Command Prompt window one by one hitting Enter after each line.adb shell am start -n com.google.android.gsf.login/adb shell am start -n com.google.android.gsf.login.LoginActivityadb shell content insert --uri content://settings/secure --bind name:s:user_setup_complete --bind value:s:1To remove FRP on Other Brands / MTK /SPD via ADB commands: Type the following ADB FRP bypass command into the Command Prompt window and hit Enter after each line.adb shell content insert --uri content://settings/secure --bind name:s:user_setup_complete --bind value:s:1When the commands are all executed, the FRP lock will be removed from your device. That is how to use ADB FRP bypass to remove the lock from your phone.. adb install adb uninstall adb shell pm list packages adb shell pm path adb shell pm clear. File Manager adb pull adb push adb shell ls adb shell cd adb shell rm adb shell mkdir adb shell touch adb shell cat adb shell pwd adb shell cp adb shell mv. Network adb shell netstat adb shell ping adb shell netcfg adb shell ip. adb install adb uninstall adb shell pm list packages adb shell pm path adb shell pm clear. File Manager adb pull adb push adb shell ls adb shell cd adb shell rm adb shell mkdir adb shell touch adb shell cat adb shell pwd adb shell cp adb shell mv. Network adb shell netstat adb shell ping adb shell netcfg adb shell ip.Adb install commands - ADB Shell
Is now connected with your Fire TV via ADB.Disabling Automatic Updates on Your Fire TV Using ADBOnce you have connected your computer to your Fire TV, disabling automatic updates is fairly simple. Just follow these steps: Step 1: With your command prompt still open and your computer connected to your Fire TV, type “su” and hit Enter. Now, you have admin-level privileges on your Fire TV. Step 2: If your Fire Stick has OS3, type “ADB shell pm disable com.amazon.dcp” and hit Enter as shown below: Step 2 (Alternate): If your Fire Stick has OS5 or greater, then type “ADB shell pm hide com.amazon.device.software.ota” and press Enter as shown below: And that’s pretty much it. Automatic updates on your Amazon Fire Stick have now been disabled. Important note: If you’re running into issues, try typing the commands without adding “ADB shell” at the start. Enabling Automatic Updates on Your Fire TV If you’d like to ever reactivate automatic updates on your Amazon Fire TV for whatever reason, you have two options: You can either perform a factory reset. You can use ADB Shell again. To enable automatic updates on your Fire TV using ADB Shell, you just have to follow the same steps given above with one small change:If you’re using OS3, replace the “ADB shell pm disable com.amazon.dcp” with the “ADB shell pm enable com.amazon.dcp” command. If you’re using OS5 or greater, replace the “ADB shell pm hide com.amazon.device.software.ota” command with the “ADB shell pm unhide com.amazon.device.software.ota” command. Wrapping Things Up… And that’s it. Using this process, you can make developer-level changes to your Fire Stick and disable those pesky automatic updates. Now, you’re free to install whatever custom apps you want without having to worry that they’ll stop working once an automatic update rolls around. You can also be stress-free that an update won’t come up when you have friends or family over. Have you ever had an unpleasant experience with automatic updates on your Amazon Fire Stick? Let us know in the comments below. You are using an out of date browser. It may not display this or other websites correctly.You should upgrade or use an alternative browser. #1 Would this work without root? And if so, could I set it to powersave and expect the result to stick after a reboot?How to change CPU frequencyyou can change the CPU frequency on your android device regardless of what your CPU governor is. You will be actually changing the governor to one that only takes userspace input in determining frequency.The first step is to make sure you have the userspace governor available on your device..root@:/ # cat /sys/devices/system/cpu/cpu0/cpufreq/scaling_available_governorsinteractive ondemand userspace powersave performancewe have the userspace governor on my Nexus 4, you should see it on any other Android device as well since it’s an old and simple governor.Next we will set our governor to be userspace.root@:/ # echo userspace > /sys/devices/system/cpu/cpu0/cpufreq/scaling_governorroot@:/ # cat /sys/devices/system/cpu/cpu0/cpufreq/scaling_governorusersapceIt is set now. If the governor isn’t set then scaling_governor will return something else.Now it’s just a matter of determining what frequencies are available and setting them.root@:/ cat /sys/devices/system/cpu/cpu0/cpufreq/scaling_available_frequencies384000 486000 594000 702000 810000 918000 1026000 1134000 1242000 1350000 1458000 1512000For Locking CPU Frequecy at a particular level:By using below mentioned ADB Command we can lock CPU Frequencyadb shell "echo userspace > /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu0/cpufreq/scaling_max_freq"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu0/cpufreq/scaling_min_freq"adb shell "echo userspace > /sys/devices/system/cpu/cpu1/cpufreq/scaling_governor"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu1/cpufreq/scaling_max_freq"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu1/cpufreq/scaling_min_freq"adb shell "echo userspace > /sys/devices/system/cpu/cpu2/cpufreq/scaling_governor"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu2/cpufreq/scaling_max_freq"adb shell "echo 1600000 >ADB-Shell/ADB.md at master MobileHacks/ADB-Shell - GitHub
UI Home' app.•Select first action:'com.android.quickstep.RecentsActivity'•create shortcut(you can customize it)☆'shortcut' button may be a premium/paid option in some 'navigation bar' Apps.☆ ''Accesibility trick''When phone is offline, tap 'accesibility button' on setup wizard screen.Go to: 'installed apps' -> 'Live Transcribe' app -> 'open Live Transcribe' -> Open Settings -> tap 'back button' in the upper corner -> You are on 'Phone Settings Page'☆if you need Navigation buttons during the installation, go to 'settings' -> 'accesibility' -> 'interaction and dexterity' -> turn on 'assistant menu'.☆App Links:-Alliance Shield x QR CoDe-Aliance shield X Free Registration link.-Alliance Shield X official in Play Store-Splashtop Add-on official in Play Store.-Splashtop add-on all versions.-Uninstaller (Playstore) or Uninstaller (DirectLink) - helpful in Uninstaling Splashtop add-on app in some cases. thanks to @fitrockx-SamFw Tool - for pc, to acces locked ADB, etc.-Minimal ADB and Fastboot Tool for pc, classic adb command prompt.-Adb App Control - for pc, with pretty nice interfece that allow to enable/disable/install/uninstall apps thru Adb.-NotifiCon - notification sound manager app, fixes missing nottifications sound, thanks to coolpix4-Net Guard to block apps from the internet access.☆Optional:Disable those Apps after Kg Lock bypass to:●Unlock Adb/Mtp or Phone Calling:-'Device Services' (com.samsung.android.kgclient)-'Knox Enrolment Service' (com.sec.enterprise.knox.cloudmdm.smdms)●Disable Android Firmware Updates/Notifications:-'Software Update' (com.wssyncmldm)You can try to disable them thru 'Lycan ccswe app manager' or Alliance shield x'.If you cant disable them thru phone apps, you can download SamFw Tool for pc and use 'disable knox' option, that should disable all knox apps.Or You can use Adb 'disable' commands (if You have adb acces).To acces adb you need to enable 'adb debug' option in phone settings developer options.Or if you cant do this, tap 'Phone' app and type *#0*# when using SamFw Tool, to unlock adb.☆Optional Adb commands:Open OneUi Home Screenadb shell am start -n com.sec.android.app.launcher/.activities.LauncherActivityOpen Android Settingsadb shell am start com.android.settingsDisable Device Servicesadb shell pm disable-user --user 0 com.samsung.android.kgclientDisable Knox Enrolment Serviceadb shell pm disable-user --user 0 com.sec.enterprise.knox.cloudmdm.smdmsDisable Software Update²adb shell pm disable-user --user 0 com.wssyncmldm❗️if You Locked Your screen by Build-in System Screen Lock (even when I wrote to don't ...) You can unlock it thru adb(if You have adb acces):adb shell locksettingsGitHub - matan-h/adb-shell: better `adb shell`
By Color Box TechnologyFreeUser RatingUsed ADB Shell - Debug Toolbox for Android? Share your experience and help other users.Key Details of ADB Shell - Debug ToolboxLast updated on January 16, 2025There have been 8 updatesVirus scan status:Clean (it’s extremely likely that this software program is clean)ADB Shell - Debug Toolbox 0/1Developer’s DescriptionThis is a powerful adb shell & toolbox.Toolbox features:1. Support launch application & uninstall application & download application & force stop application & clear application data & disable application & enable application.2. Support device management.3. Support view running applications4. Support take screenshot.5. Support push file6. Support install apk7. Support pull file8. Support to open remote image&audio&video files directly9. Support delete remote file10. Support TV remote controller11. Support text input12. Support System monitor 13. Support view system information.14. Support view prop information.Shell features:1. Support Android 4.X-Android 132. Support wireless pair mode(Android 11-Android13)3. Support wifi wireless adb.4. Support local shell adb.5. Support associative input.6. Support autosave output.7. Support share output with your friends.8. Support command history.9. Support fast copy command.10. Support multi-window.11. Support color text.12. Support run on the background.13. Support recommend commands.14. Support recommend files.15. Support prefab commands.16. Support logcat.How to enable adb & feedbackgithub colorboxguestservice@gmail.comawesome-adb MoreKawaks Arcade EmulatorFreeSamsung Gear 360 (New)FreeNissan/infinity Bcm to PinPaidXray Body Scanner Camera RealFree. adb install adb uninstall adb shell pm list packages adb shell pm path adb shell pm clear. File Manager adb pull adb push adb shell ls adb shell cd adb shell rm adb shell mkdir adb shell touch adb shell cat adb shell pwd adb shell cp adb shell mv. Network adb shell netstat adb shell ping adb shell netcfg adb shell ip.Adb Install - Android ADB Shell Commands
Adb to set up forwarding to named abstract UNIX domain sockets, as illustrated here:adb forward tcp:6100 local:logd Copying Files to or from an Emulator/Device InstanceYou can use the adb commands pull and push to copy files toand from an emulator/device instance. Unlike the install command,which only copies an APK file to a specific location, the pull and pushcommands let you copy arbitrary directories and files to any location in anemulator/device instance. To copy a file or directory (and its sub-directories) from the emulator or device, useadb pull To copy a file or directory (and its sub-directories) to the emulator or device, use adb push In the commands, and refer to thepaths to the target files/directory on your development machine (local) and on theemulator/device instance (remote). For example: adb push foo.txt /sdcard/foo.txtIssuing Shell CommandsAdb provides a Unix shell that you can use to run a variety of commands on an emulatoror connected device. The command binaries are stored in the file system of the emulator or device,at /system/bin/...Two of the most common command tools are activity manager (am) andpackage manager (pm).You can use the shell command to issue commands, with or without enteringthe adb remote shell on the emulator/device. To issue a single command without entering aremote shell, use the shell command like this: adb [-d|-e|-s ] shell Or enter a remote shell on an emulator/device like this: adb [-d|-e|-s ] shellWhen you are ready to exit the remote shell, press CTRL+D or typeexit. Using activity manager (am)Within an adb shell, you can issue commands with the activity manager (am) tool toperform various system actions, such as start an activity, force-stop a process,broadcast an intent, modify the device screen properties, and more. While in a shell,the syntax is:am You can also issue an activity manager command directly from adbwithout entering a remote shell. For example:adb shell am start -a android.intent.action.VIEWTable 2. Available activity manager commands Command Descriptionstart [options] Start an Activity specified by . See theSpecification for arguments.Options are: -D: Enable debugging. -W: Wait for launch to complete. --start-profiler : Start profiler and send results to . -P : Like --start-profiler, but profiling stops when the app goes idle. -R: Repeat the activity launch times. Prior to each repeat, the top activity will be finished. -S: Force stop the target app before starting the activity. --opengl-trace: Enable tracing of OpenGL functions. --user | current: Specify which user to run as; ifComments
Acquired from and MacFly contain the: GPS Setter, GPS Joystick, and Hide Mock Location. MacFly demonstrated how the tool could be used to spoof the location of a particular modified coordinate, along with a victim’s pre-recorded route, which allows a threat actor to imitate a client in movement (e.g., driving in a taxi). During installation, HUNTER identified the following modules:adb push !workspace.novabackup /storage/emulated/0/ adb push data /storage/emulated/0 adb push 01_Busybox.zip /storage/emulated/0 adb push 02_Propsf.zip /storage/emulated/0/ adb push 03_ACC.zip /storage/emulated/0/ adb push 04_Font_Manager.zip /storage/emulated/0/ adb push 05_hide-usb-debugging.zip /storage/emulated/0/ adb push 06_Riru.zip /storage/emulated/0/ adb push 07_safetynet.zip /storage/emulated/0/ adb push 09_LSPosed.zip /storage/emulated/0/ adb push 10_momohider.zip /storage/emulated/0/ adb push 08_overlayfs.zip /storage/emulated/0/ adb push 11_riru-unshare_a10.zip /storage/emulated/0/ adb push 12_Storage.zip /storage/emulated/0/ adb push 12_sui.zip /storage/emulated/0/ adb push 13_AppDataIsolation.zip /storage/emulated/0/ adb push 14_liboemcrypto_disabler.zip /storage/emulated/0/ adb push 15_fakeencryption.zip /storage/emulated/0/ adb push 16_hidemodified_init.rc.zip /storage/emulated/0/ adb push 17_resetsensitiveprops.zip /storage/emulated/0/ adb push 18_BlockAds.zip /storage/emulated/0/ adb push 19_storage_iso.zip /storage/emulated/0/ adb push app-release.apk /storage/emulated/0/ adb push Hidemyapplist.json /storage/emulated/0/ adb push base.settings /storage/emulated/0/ adb push base_2.12_premium.settings /storage/emulated/0/ adb push LSPosed.lsp.gz /storage/emulated/0/ rem adb shell su -c pm disable com.coloros.phonemanager rem shell su -c pm disable com.oppo.ota rem shell su -c pm disable com.nearme.romupdate rem shell su -c pm disable com.coloros.sau adb shell su -c setenforce 1 adb shell su -c magisk --install-module /storage/emulated/0/01_Busybox.zip adb shell su -c magisk --install-module /storage/emulated/0/02_Propsf.zip adb shell su -c magisk --install-module /storage/emulated/0/03_ACC.zip adb shell su -c magisk --install-module /storage/emulated/0/04_Font_Manager.zip adb shell su -c magisk --install-module /storage/emulated/0/05_hide-usb-debugging.zip adb shell su -c magisk --install-module /storage/emulated/0/06_Riru.zip adb shell su -c magisk --install-module /storage/emulated/0/07_safetynet.zip adb shell su -c magisk --install-module /storage/emulated/0/09_LSPosed.zip adb shell su -c magisk --install-module /storage/emulated/0/10_momohider.zip adb shell su -c magisk --install-module /storage/emulated/0/11_riru-unshare_a10.zip adb shell su -c magisk --install-module /storage/emulated/0/12_Storage.zip adb shell su -c magisk --install-module /storage/emulated/0/08_overlayfs.zip adb shell su -c magisk --install-module /storage/emulated/0/12_sui.zip adb shell su -c magisk --install-module /storage/emulated/0/13_AppDataIsolation.zip adb shell su -c magisk --install-module /storage/emulated/0/14_liboemcrypto_disabler.zip adb shell su -c magisk --install-module /storage/emulated/0/15_fakeencryption.zip adb shell su -c magisk --install-module /storage/emulated/0/16_hidemodified_init.rc.zip adb shell su -c magisk --install-module /storage/emulated/0/17_resetsensitiveprops.zip adb shell su -c magisk --install-module /storage/emulated/0/18_BlockAds.zip adb shell su -c magisk --install-module /storage/emulated/0/19_storage_iso.zip echo press for end install pause adb shell su -c magiskhide add com.google.android.gms adb shell su -c magiskhide add com.google.android.gms.unstable adb shell su -c magiskhide add com.byxiaorun.detector adb shell rm /storage/emulated/0/01_Busybox.zip adb shell rm /storage/emulated/0/02_Propsf.zip adb shell rm /storage/emulated/0/03_ACC.zip adb shell rm /storage/emulated/0/04_Font_Manager.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.z adb shell rm /storage/emulated/0/06_Riru.zip adb shell rm /storage/emulated/0/07_safetynet.zip adb shell rm /storage/emulated/0/09_LSPosed.zip adb shell rm /storage/emulated/0/10_momohider.zip adb shell rm /storage/emulated/0/11_riru-unshare_a10.zip adb shell rm /storage/emulated/0/12_Storage.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.zip adb shell rm /storage/emulated/0/!workspace.novabackup adb shell rm /storage/emulated/0/08_overlayfs.zip adb shell rm /storage/emulated/0/12_sui.zip adb shell rm /storage/emulated/0/13_AppDataIsolation.zip adb shell rm /storage/emulated/0/14_liboemcrypto_disabler.zip adb shell rm /storage/emulated/0/15_fakeencryption.zip adb shell rm /storage/emulated/0/16_hidemodified_init.rc.zip adb shell rm /storage/emulated/0/19_storage_iso.zip adb shell rm /storage/emulated/0/18_BlockAds.zip adb shell rm /storage/emulated/0/17_resetsensitiveprops.zipThe actors deploy LSPosed, and HideMyApp (HMA), with configuration settings defined in the "Hidemyapplist.json" file. In addition to that, the package drops "base.settings" and "base_2.12_premium.settings" in encrypted form. Recovered "Hidemyapplist.json" by our reverse engineers contains the following list of supported applications from major online
2025-04-13To upload them onto a device.app: additional softwareArchitecture (previously - Xposed) - unofficial Android framework made for changing codes of system apps ( the author of mobile antidetects uses fork Magisk Delta from HuskyDG - Magisk Delta contains a magiskhide module allowing to hide root from selected apps (which doesn't exist in the official package). The main differences between Magisk Delta from the official version of Magisk are provided below:InstallationTo install the solution on the device, you must first unlock the bootloader and install the driver to connect the device to the PC. Check the connection with the adb devices command.Go to the folder sideload Install MagiskDelta: app-release.apk, to get the root root. Подробнее that Magisk has been successfully installed and has the status Installed:Launch batch script !install.batContent of !install.bat: @echo offadb push !workspace.novabackup /storage/emulated/0/adb push data /storage/emulated/0adb push 01_Busybox.zip /storage/emulated/0 adb push 02_Propsf.zip /storage/emulated/0/adb push 03_ACC.zip /storage/emulated/0/adb push 04_Font_Manager.zip /storage/emulated/0/adb push 05_hide-usb-debugging.zip /storage/emulated/0/adb push 06_Riru.zip /storage/emulated/0/adb push 07_safetynet.zip /storage/emulated/0/adb push 09_LSPosed.zip /storage/emulated/0/adb push 10_momohider.zip /storage/emulated/0/adb push 08_overlayfs.zip /storage/emulated/0/adb push 11_riru-unshare_a10.zip /storage/emulated/0/adb push 12_Storage.zip /storage/emulated/0/adb push 12_sui.zip /storage/emulated/0/adb push 13_AppDataIsolation.zip /storage/emulated/0/adb push 14_liboemcrypto_disabler.zip /storage/emulated/0/adb push 15_fakeencryption.zip /storage/emulated/0/adb push 16_hidemodified_init.rc.zip /storage/emulated/0/adb push 17_resetsensitiveprops.zip /storage/emulated/0/adb push 18_BlockAds.zip /storage/emulated/0/adb push 19_storage_iso.zip /storage/emulated/0/adb push app-release.apk /storage/emulated/0/adb push Hidemyapplist.json /storage/emulated/0/adb push base.settings /storage/emulated/0/adb push base_2.12_premium.settings /storage/emulated/0/adb push LSPosed.lsp.gz /storage/emulated/0/rem adb shell su -c pm disable com.coloros.phonemanagerrem shell su -c pm disable com.oppo.otarem shell su -c pm disable com.nearme.romupdaterem shell su -c pm disable com.coloros.sauadb shell su -c setenforce 1adb shell su -c magisk --install-module /storage/emulated/0/01_Busybox.zip adb shell su -c magisk --install-module /storage/emulated/0/02_Propsf.zipadb shell su -c magisk --install-module /storage/emulated/0/03_ACC.zipadb shell su -c magisk --install-module /storage/emulated/0/04_Font_Manager.zipadb shell su -c magisk --install-module /storage/emulated/0/05_hide-usb-debugging.zipadb shell su -c magisk --install-module /storage/emulated/0/06_Riru.zipadb shell su -c magisk --install-module /storage/emulated/0/07_safetynet.zipadb shell su -c magisk --install-module /storage/emulated/0/09_LSPosed.zipadb shell su -c magisk --install-module /storage/emulated/0/10_momohider.zipadb shell su -c magisk --install-module /storage/emulated/0/11_riru-unshare_a10.zipadb shell su -c magisk --install-module /storage/emulated/0/12_Storage.zipadb shell su -c magisk --install-module /storage/emulated/0/08_overlayfs.zipadb shell su -c magisk --install-module /storage/emulated/0/12_sui.zipadb shell su -c magisk --install-module /storage/emulated/0/13_AppDataIsolation.zipadb shell su -c magisk --install-module /storage/emulated/0/14_liboemcrypto_disabler.zipadb shell su -c magisk --install-module /storage/emulated/0/15_fakeencryption.zipadb shell su -c magisk --install-module /storage/emulated/0/16_hidemodified_init.rc.zipadb shell su -c magisk --install-module /storage/emulated/0/17_resetsensitiveprops.zipadb shell su -c magisk --install-module /storage/emulated/0/18_BlockAds.zipadb shell su -c magisk --install-module /storage/emulated/0/19_storage_iso.zipecho press for end installpause adb shell su -c magiskhide add com.google.android.gms adb shell su -c magiskhide add com.google.android.gms.unstableadb shell su -c magiskhide add com.byxiaorun.detectoradb shell rm /storage/emulated/0/01_Busybox.zip adb shell rm /storage/emulated/0/02_Propsf.zip adb shell rm /storage/emulated/0/03_ACC.zip adb shell rm /storage/emulated/0/04_Font_Manager.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.zadb shell rm /storage/emulated/0/06_Riru.zip adb shell rm /storage/emulated/0/07_safetynet.zip adb shell rm /storage/emulated/0/09_LSPosed.zip adb shell rm /storage/emulated/0/10_momohider.zip adb shell rm /storage/emulated/0/11_riru-unshare_a10.zipadb shell rm /storage/emulated/0/12_Storage.zip adb shell rm /storage/emulated/0/05_hide-usb-debugging.zip adb shell rm /storage/emulated/0/!workspace.novabackup adb shell rm /storage/emulated/0/08_overlayfs.zipadb shell rm /storage/emulated/0/12_sui.zipadb shell rm /storage/emulated/0/13_AppDataIsolation.zipadb shell rm /storage/emulated/0/14_liboemcrypto_disabler.zipadb shell rm /storage/emulated/0/15_fakeencryption.zipadb shell rm /storage/emulated/0/16_hidemodified_init.rc.zipadb shell rm /storage/emulated/0/19_storage_iso.zipadb shell rm /storage/emulated/0/18_BlockAds.zipadb shell rm /storage/emulated/0/17_resetsensitiveprops.zipThis script will install all the necessary Magisk modules to the device. Note that not all paths used in the script correspond to the data in the sideload directory. Some are missing; others have changed
2025-04-04How to Use ADB Commands to Bypass FRPDownload the latest ADB Installer setup file from the Internet.Run the adb-setup.exe and type ‘Y’ and follow the onscreen instructions to install the ADB and fastboot driver.Power on your device normally and connect it to your PC using USB cable.Go the folder where the adb drivers are installed. (In most cases they are installed in the C Drive (Windows Drive))Hold down Shift, right-click anywhere blank in the ADB folder, and select "Open command window here".To remove FRP on Samsung devices via ADB commands: Type the following ADB FRP bypass command into the Command Prompt window one by one hitting Enter after each line.adb shell am start -n com.google.android.gsf.login/adb shell am start -n com.google.android.gsf.login.LoginActivityadb shell content insert --uri content://settings/secure --bind name:s:user_setup_complete --bind value:s:1To remove FRP on Other Brands / MTK /SPD via ADB commands: Type the following ADB FRP bypass command into the Command Prompt window and hit Enter after each line.adb shell content insert --uri content://settings/secure --bind name:s:user_setup_complete --bind value:s:1When the commands are all executed, the FRP lock will be removed from your device. That is how to use ADB FRP bypass to remove the lock from your phone.
2025-04-01Is now connected with your Fire TV via ADB.Disabling Automatic Updates on Your Fire TV Using ADBOnce you have connected your computer to your Fire TV, disabling automatic updates is fairly simple. Just follow these steps: Step 1: With your command prompt still open and your computer connected to your Fire TV, type “su” and hit Enter. Now, you have admin-level privileges on your Fire TV. Step 2: If your Fire Stick has OS3, type “ADB shell pm disable com.amazon.dcp” and hit Enter as shown below: Step 2 (Alternate): If your Fire Stick has OS5 or greater, then type “ADB shell pm hide com.amazon.device.software.ota” and press Enter as shown below: And that’s pretty much it. Automatic updates on your Amazon Fire Stick have now been disabled. Important note: If you’re running into issues, try typing the commands without adding “ADB shell” at the start. Enabling Automatic Updates on Your Fire TV If you’d like to ever reactivate automatic updates on your Amazon Fire TV for whatever reason, you have two options: You can either perform a factory reset. You can use ADB Shell again. To enable automatic updates on your Fire TV using ADB Shell, you just have to follow the same steps given above with one small change:If you’re using OS3, replace the “ADB shell pm disable com.amazon.dcp” with the “ADB shell pm enable com.amazon.dcp” command. If you’re using OS5 or greater, replace the “ADB shell pm hide com.amazon.device.software.ota” command with the “ADB shell pm unhide com.amazon.device.software.ota” command. Wrapping Things Up… And that’s it. Using this process, you can make developer-level changes to your Fire Stick and disable those pesky automatic updates. Now, you’re free to install whatever custom apps you want without having to worry that they’ll stop working once an automatic update rolls around. You can also be stress-free that an update won’t come up when you have friends or family over. Have you ever had an unpleasant experience with automatic updates on your Amazon Fire Stick? Let us know in the comments below.
2025-04-19You are using an out of date browser. It may not display this or other websites correctly.You should upgrade or use an alternative browser. #1 Would this work without root? And if so, could I set it to powersave and expect the result to stick after a reboot?How to change CPU frequencyyou can change the CPU frequency on your android device regardless of what your CPU governor is. You will be actually changing the governor to one that only takes userspace input in determining frequency.The first step is to make sure you have the userspace governor available on your device..root@:/ # cat /sys/devices/system/cpu/cpu0/cpufreq/scaling_available_governorsinteractive ondemand userspace powersave performancewe have the userspace governor on my Nexus 4, you should see it on any other Android device as well since it’s an old and simple governor.Next we will set our governor to be userspace.root@:/ # echo userspace > /sys/devices/system/cpu/cpu0/cpufreq/scaling_governorroot@:/ # cat /sys/devices/system/cpu/cpu0/cpufreq/scaling_governorusersapceIt is set now. If the governor isn’t set then scaling_governor will return something else.Now it’s just a matter of determining what frequencies are available and setting them.root@:/ cat /sys/devices/system/cpu/cpu0/cpufreq/scaling_available_frequencies384000 486000 594000 702000 810000 918000 1026000 1134000 1242000 1350000 1458000 1512000For Locking CPU Frequecy at a particular level:By using below mentioned ADB Command we can lock CPU Frequencyadb shell "echo userspace > /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu0/cpufreq/scaling_max_freq"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu0/cpufreq/scaling_min_freq"adb shell "echo userspace > /sys/devices/system/cpu/cpu1/cpufreq/scaling_governor"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu1/cpufreq/scaling_max_freq"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu1/cpufreq/scaling_min_freq"adb shell "echo userspace > /sys/devices/system/cpu/cpu2/cpufreq/scaling_governor"adb shell "echo 1600000 > /sys/devices/system/cpu/cpu2/cpufreq/scaling_max_freq"adb shell "echo 1600000 >
2025-03-29