價格:免費
更新日期:2018-11-06
檔案大小:7.2M
目前版本:1
版本需求:Android 3.2 以上版本
官方網站:mailto:hamza.mouniiir@gmail.com
Email:https://sites.google.com/site/sprilexprivacypolicy/
聯絡地址:Mainzerstraße 103 66121 Saarbrücken Germany
Scan your Android device and unlock hidden features, hidden information,hidden codes and hacks you did not know before.
Now, you do not have to remember all these codes. With mobile secret codes, you can execute them directly by tapping a finger!
Also you can enter them directly into the dialer application so it is The easiest way
Access all secret menus, hidden codes or menus easily, just tap! Discover hidden features and enjoy! Have fun!
This app will help find the USSD codes for all mobile operators in all countries.
Example:
Easily get information about Test devices with mobile secret codes:
Vibration, flashlight, sensor, battery, Bluetooth, Wifi, brightness.
Mobile secret codes: List all secret codes (hidden menu) on your device.
Firmware: Search for firmware available online for your phone and any other mobile device.
Available manufacturers: Samsung, Sony, Oppo, HTC, LG, Motorola, Nokia, Apple and others
Key Features: Displays the following information on your phone.
- field mode, general test mode, IMEI number, call forwarding check, SMS messaging center, call waiting activation, quick test menu,
Easily get information from your device with mobile secret codes:
- Operating system information (builds release, fingerprint, build Id ... etc.);
- Information on the screen (pixel height, pixel width);
- Pullable information (height and width of the icon origin)
- Device information (brand, manufacturer, model ... etc.)
- Density information
▪ General information:
- Manufacturer / Brand
- Phone model
- Device type
- Product Name
- Native country
- Date of manufacture
- Knox Void Warranty
- Color / internal storage
▪ CSC INFO:
- Product code
- Original CSC code
- Firmware CSC Code
- Active CSC Code
- Avalable CSC Codes
- CSC countries
- Mobile operator
▪ FIRMWARE INFO:
- Bootloader version
- PDA version
- CSC version
- Baseband version
- Latest firmware
- Kernel Version / Architecture (32/64-bit)
- Java Virtual Machine (Dalvik or ART)
▪ OS INFO:
- Existence of root
- Android version
- Build number
- Build a fingerprint
- Construction description
- Construction date
- Modify the list
▪ MATERIAL INFO:
- Hardware / card (CPU 32/64-bit)
- Platform / chip
- GPU (graphic processing unit)
- Modem card
- Material revision
- total RAM
- Screen (physical size in inches, resolution in pixels, density in dpi and ppi)
- Soundcard
- Camera
- Sensors
- Battery (technology, capacity in mAh, health)
▪ DEVICE ID:
- IMEI
- Android serial number
- Samsung serial number
▪ HISTORY OF USE:
- Connect Counter Headphones
- Charger Connect Counter (root required)
- Det Detach S Counter (root required, for Galaxy Note series only)
▪ MONITOR:
- CPU / battery / ambient temperatures
- CPU / memory usage
- Voltage / level of the battery
- Signal strength
One of the most common practices among today's software developers is to leave some types of backdoors in operating systems. These "back doors" essentially allow any user with sufficient knowledge to enter the system at a much deeper level than expected of a normal user. These backdoors are not always intended to be used for malicious purposes, as they allow programmers access to the system to solve problems when other usual access modes have been blocked. And for developers, they can be very friendly and helpful if you know what you are doing. In smartphones, these backdoor are called "secret codes".