configuring kodi built in python - Android Q&A, Help & Troubleshooting

i have a "retail" kodi box with a custom kodi apk that has alot of changes done to the built in python , inside the apk.
it allows auto updates to the build, secure wizard, faster playback and ssl playback. my iptv service requires this to run and im desperate to reverse engineer it.. so it can boot up on any android box and not just their's
i took a fresh kodi apk, replaced the lib/armeabi-v7a with there armeabi-v7a folder and got the ssl playback to work but when sticking the apk on other boxes. it wont boot up.
can anyone help me?
i look into the libkodi.so file since replacing it stops the playback. i found the auto update and wizard code in the file... but thats not what im looking for.
willing to pay up to $100 to anyone that can get this to boot on my other boxes..
i just learned what armeabi is. sorry for calling it python

Related

Urgently XDA Developer needed on partnership basis

Hi All,
I am looking for someone to help create .apk for Android boxes.
This will be an ongoing partnership as we will update the apk with regular update every month which should automatically show on clients box.
If you think you are the right person and have time on your hands to create apk please let us know.
I would also like to know about how the firmwares can be altered on android boxes.
If you have hands on customised XBMC and other live streaming links we would like to create them as well within the apk and XBMC.
The main thing I am after is creating 1 or max of 3 files which will
1. Root the android box
2. Install the new apk file/firmware
3. Install the customised XBMC with our logo, etc.
I am looking at a quick option to connect android box with computer and run the files to achieve the above points.
Looking for a favourable reply.

Embedded script in image

Im willing to pay through PayPal. I have a jp 5 s tablet from a prison it can receive bluetooth but installation of apps from unknown sources is blocked. In settings the check box to allow this has been disabled. It runs 4.2.2 Jellybean so my only hope is an image music file or video that could some how run a script to allow it or install a file manager. That's my ultimate goal. Thanks for any help.

[APP][MOD] Remove device/OS check

Hi i've been browsing the forum trying to find a solution but however i'm limited by my knowledge.
Basicly there is an Game/app made built by GameMaker but the target system was not meant to support AndroidTV. I'm trying to run this game on my nvidia shield.
I sideloaded the app and whenever i launch it i see the background of the game as if it was going to work and then the app crash and i get the following error message :
Incorrect android target. This executable targets android TV devices. This build is for android".
I've download Apk Studio / Apk tool and i tried to find out in the code where would that check happen and how i can allow AndroidTv devices to run this app. However i don't see much in the manifest file that would stop the app from running in AndroidTv.
Anyone out there with more knowledge can chime in and give some ideas ?
Here is a link to the app i'm trying to modify.
https://drive.google.com/open?id=1LrddBPcAK9Ufs9Eo8Jl5Z_zTTDvKzzHO
Thank you

Telus Pik TV on Amazon Firestick FireTV Box

Any chance someone can mod the apk to fit the resolution on an amazon firetv? You can load the apk up but the guide needs to be scrolled across. Maybe someone in BC or Alberta can take a shot at this.
https://apkpure.com/pik-tv%E2%84%A2/com.telus.mediaroom.tvx.proda
TELUS PIK TV - ATV VERSION (com.telus.mediaroom.tvx.byod) v2.00.096.1 BYOD
HDCP + ROOT DETECTION REMOVAL FIX
piktv-hdcp-root-fix-2000961.apk - Mirrored.to - Mirrorcreator - Upload files to multiple hosts
Securely upload your files, media and documents to more than 30 cloud storage providers simultaneosuly. Remote Upload files to Google Drive and many other hosts.
mir.cr
bettycharmer said:
TELUS PIK TV - ATV VERSION (com.telus.mediaroom.tvx.byod) v2.00.096.1 BYOD
HDCP + ROOT DETECTION REMOVAL FIX
piktv-hdcp-root-fix-2000961.apk - Mirrored.to - Mirrorcreator - Upload files to multiple hosts
Securely upload your files, media and documents to more than 30 cloud storage providers simultaneosuly. Remote Upload files to Google Drive and many other hosts.
mir.cr
Click to expand...
Click to collapse
Telus updated the PIK TV app again, are you able to upload the latest version?
The latest version is a complete rewrite of the app, with greater improvement around the DRM methods, which is proving difficult to bypass to enable playback support on older / non-certified AndroidTV boxes.
That said, however, I've managed to update the older version of the app for now to bypass the "force update" version check and it appears to be working again
TELUS PIK TV - ATV VERSION (com.telus.mediaroom.tvx.byod) v2.00.096.1 BYOD
HDCP + ROOT DETECTION REMOVAL + FORCE VERSION UPDATE FIX
piktv-hdcp-root-version-fix-2000961.apk - Mirrored.to - Mirrorcreator - Upload files to multiple hosts
Securely upload your files, media and documents to more than 30 cloud storage providers simultaneosuly. Remote Upload files to Google Drive and many other hosts.
mir.cr
I'm getting a parsing error when installing. Might sound like a noob question, but perhaps it's corrupt or my installation on the firestick requires something more than unknown sources and ADP. Thanks

Using a .so file in an android app? How can I access the hardware depth sensor on my (rooted) phone?

I'm building an application that requires the use of the depth sensor on my Samsung Galaxy A80. However it seems like it's impossible to access it through Camera2 and ARCore. I asked Samsung directly and the tech support guys best guess was that Samsung has locked it from being used by third parties.
I rooted my phone and started digging through the file system and eventually found a file called 'com.samsung.sensor.imx316.so' located in /vendor/lib/camera (imx316 is the depth sensor). There are also some similar files that ends in '.bin', but .so files seems to be runnable code if I understood the google results correctly.
That file has the same name as the sensor I can't seem to access. Can this file be used somehow? Can I run it in my own app to get access to the depth data? And if not, there should be a way of getting that data right? I mean, it obviously exists somewhere in the phone since pre-installed apps are using it, and a rooted phone has access to everything?
Did you check REQUEST_AVAILABLE_CAPABILITIES_DEPTH_OUTPUT? How do you know it's impossible?
Most likely you need to reverse engineer the Camera app from your phone.
Your app can call com.samsung.sensor.imx316.so , it's really "just" a linux elf library.
The problem you face is the exported routines from the library, you won't really know
1) the parameters to the functions inside the library
2) any specific order to call functions inside the library i.e. like an init function first , release memory last...
You need to disassemble / reverse engineer the library to make some sense of it (see ghidra / radare2/ ida pro etc ).
Use strace on the current process/app which uses the library to make some sense of the order of calls into the library.
The depth data will be coming from a kernel level driver, you can likely obtain the Samsung kernel source and the driver source should be there. Then it's up to you whether you can make user space library/code to read what the driver exposes. The kernel driver source code will have an uapi header file to investigate.
idk if it helps but i used for a Huawei P30 Pro this https://github.com/Nufflee/tof-camera

Categories

Resources