This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
In fact, everything is not complicated! ( Too confuse you not to ) use ( also dancing with tambourines ), a program with playmarket NEXMON for perhvatov henshekov with built-in adapter ( there is in it plus and minus at the same time records only full hendsh ie 4 Pack ) , and for everything else, the NenHunter described above with an external USB WiFi adapter as a whistle from Tp-link and the vaunted ALFA until laziness won out and began to read the documentation in English ( with the help of the translator's hum, of course! ) The described technique works, as I understand it, only Nexus, because a moddriver was written for it, but maybe I'm wrong! Using a mobile phone with an external USB WiFi adapter, the list of models is wide, although not many models are officially supported, but there are quite a few assemblies for a specific model (google help ) The assemblies indicated in the links below may not correspond to what I have! from above, the elementax kernel was also rolled up, which I should note did n |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
When trying to install some binaries (doesn't matter which one), I get this error: | |
mount: '/dev/block/platform/msm_sdcc.1/by-name/system' -> 'system': Device or resource busy | |
Im currently on Android N by fake nexus | |
I have root access and busybox installed | |
We currently do not support Android N as the toybox based mount command does not work to remount the system partition with write permissions. You might solve the issue by pointing the symlink of your mount binary under /system/bin/mount to your busybox installation. | |
Like Quote ReplyReport | |
C |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
iwconfig | |
Появился интерфейс wlan1 в auto mode | |
# | |
20% оригинала | |
1440 x 2560 (236,11 КБ) | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
mount -o remount, rw / | |
cp /data/data/material.hunter/files/scripts/bootkali* / system / bin / | |
cp /data/data/material.hunter/files/scripts/killkali / system / bin / | |
cp / data / data / material.hunter / files / scripts / bin / busybox_nh / system / bin | |
chmod 755 / system / bin / * kali * | |
chmod 755 / system / bin / busybox_nh |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
How to Bypass FRP LG Phoenix 3 | |
Turn ON your LG Phoenix 3. | |
Now at the same time Press & hold an Emergency call then keep tapping on Start Arrow | |
Once the LG homepage appears don’t touch anything. | |
Wait until the factory reset ends, then your LG Phoenix 3 Restart automatically. | |
That’s how you can Bypass FRP LG Phoenix 3 Android 7.0 Nougat LG M150 Unlock FRP. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Bypass code for calling while FRP locked | |
Code No.1: at+creg?\r\n | |
Code No.2: atd198;\r\n |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Running Debian binaries outside the chroot | |
If you need to run binaries from inside the chroot outside the chroot, you can use ld.so: | |
export SDCARD=/mnt/sdcard | |
export ROOT=$SDCARD/debian | |
export LD_LIBRARY_PATH=$ROOT/lib:$ROOT/lib/arm-linux-gnueabi:$ROOT/lib/arm-linux-gnueabihf:$ROOT/usr/lib:$ROOT/usr/lib/arm-linux-gnueabi:$ROOT/usr/lib/arm-linux-gnueabihf | |
cd $ROOT | |
./lib/ld-linux-*.so* bin/ls |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
if the libnexmonkali is built with -s (stripped), it doesn't ask for the other libs. Anyway, fixed channel -1 is still there for all the time, so have give up for now | |
Can you please provide instructions on how you built kalilibnexmon.so? I have been able to build my own libnexmon.so from the nexmon sources just fine, but I can't find instructions on how to build it for the Kali chroot environment. | |
Reply With Quote | |
2020-10-24#8yesimxev | |
Member | |
Join Date | |
2016-Nov | |
Posts | |
32 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Android NDK standalone toolchains: | |
mkdir ~/build/ndk | |
mkdir ~/build/toolchain | |
cd ~/build/ndk | |
wget http://dl.google.com/android/ndk/android-ndk-r10e-linux-x86_64.bin | |
chmod +x android-ndk-r10e-linux-x86_64.bin | |
./android-ndk-r10e-linux-x86_64.bin | |
cd android-ndk-r10e | |
build/tools/make-standalone-toolchain.sh --platform=android-21 --toolchain=arm-linux-androideabi-4.9 --install-dir="$HOME/build/toolchain/android-armhf-4.9" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Here's how I did it: | |
root the tablet by installing twrp, dm_verity and magisk | |
boot into Android | |
install root_checker and verify that the device is rooted | |
install Meefik's busybox but don't run the internal installer | |
From adb shell session or connectbot or other terminal application (log in and su) | |
cd /data/data/ru.meefik.busybox/files/scripts |
NewerOlder