This is a modified version of Haali Reader, one of my favorite Windows Mobile program. But the original author said "Modified versions must not be named 'Haali Reader'", so I renamed it TextViewNG which is, well, the name of the source code archive (and probably the original name of the project).
Removed Features:
PNG File Support
JPG File Support
ZIP File Support
XML Parser
Dictionary
Since we are using Windows, let other people do their job. I'm focusing on reading.
You can get the source code from here. This software requires MFC and the MFC in the ported app thread doesn't work. I have to rebuild my own library. The source code is copyrighted and the binary is 1.27 GB, so I'm not going to release any of those but willing to offer help.
Download
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Related
Hello all,
I did a search for fat32formatter and to my surprise nothing came up therefore I'm mentioning this now!
IMNSHO you are going to love this application
FAT32Formatter - FORMAT > 32 GB Drive
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Best of all; it is free
Get it here;
http://tokiwa.qee.jp/EN/Fat32Formatter/
EDiT:
If one does not want to install this application, one could choose to start using the freeware LiberKey;
http://www.liberkey.com/en/
I am using this application (with everything installed) on my static USB-HD and then synchronized to my dynamic USB-stick
_________________
DotNetResourcesExtract v1.01
DotNetResourcesExtract (NirSoft) is a small utility that scan dll/exe files of .NET applications, and extract all .NET embedded resources (Bitmaps, Gifs, HTML files, and so on) stored in them into the folder that you specify. c# source code is available.
o/~
Senax
Thanks for sharing.
Although this should go to off topic section
Hi all!
Since 2008 it is known a bug in stock browser of Android.
As written here: https://code.google.com/p/android/issues/detail?id=1353 Android doesn't support HTTP Basic Auth (401).
This is a problem beacuse an user can't download a protected resource. Only with third party browsers (such Firefox or Opera) it's possible to download a protected file.
So, I've written an application to download all files type, both protected or not.
The object I've used to perform the HTTP request is HttpURLConnection, for more details see the code.
The files are downloaded to /sdcard/Download.
This app require Android 2.2 or higher.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Link to the project: https://sourceforge.net/projects/wgetandroid/
Everyone is invited to improve this code because I've written it fast, so it isn't so good.
I hope that this applications can help you
Hi!
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I was struggling to create clear folder structure for maintaining reverse-engineering projects. Also doing everything manually took that much time I preferred not to compile app and read .java files of cracked application just to check that I didn't break anything while working with Smali. That's why I created this project. The code is mostly uncommented but I have made it pretty easy to read if you know basics of Ruby though I'm thinking about commenting it soon.
The software is Linux only at this moment since I'm lazy, I don't like Windows and there is no good reason to prefer Windows over Linux while reverse-engineering.
https://github.com/b10011/Android-Software-Detonator
I hope you enjoy, report bugs and contribute. And as always I'm not responsible of your acts and this shall not be used for apps that you don't have permission to reverse-engineer!
There is not much information about the obfuscation tool used by WhatsApp. By seeing WhatsApp.jar using jd-gui.exe, I can only guess that they are using ProGuard for Name Obfuscation. But About Hardcode strings, there is no much information.
so, I tried few things by myself.
WhatsApp version tested : 2.12.228 and 2.12.229
About Screens Of WhatsApp version 2.12.228 and 2.12.229
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
About.class files extracted using tool:dex2jar, viewed in tool:jd-gui
I coded same class by extracting about.xml of WhatsApp, and compiled using ProGuard, that is the result.
By seeing my About.class, I can guess WhatsApp might be using the ProGuard for Name obfuscation.
Although Its a starting point, but if someone is interested in further search to find out what tool is WhatsApp using for String obfuscation. DexGuard may be?
Date : 19-Nov-2015
Latest WhatsApp Version on Website : 2.12.360
Hello XDAers,
We all know that extracting images from Android OTA packages is extremely useful for various purposes. For example, patching the boot image to install Magisk without TWRP. The most common tool for this, however, is a Python script not easy to use for inexperienced Windows users because of Python and its dependencies.
This project aims to provide everyone a faster (by multi-threading) & cross-platform Android OTA payload extractor that's a lot easier to use - just drag and drop the ROM file onto the program.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
(Can't post outside links because of 10 posts limitation You guys have to manually copy the link below)
mod edit - link added
https://github.com/tobyxdd/android-ota-payload-extractor/releases