[iOS] Scrambled Net for iPhone / iPad released

[TL/DR] Grab it here: https://itunes.apple.com/de/app/scrambled-net/id1061103170?mt=8

As like for many of you the addictive Puzzle Game Scrambled Net was a game that I always installed as first App on any new Android phone I had in the past. When I switched to iOS for my daily driver about a year ago that game was something I always missed. It had helped me out the many times when I had to wait for a flight/train/doctor/whatever. So I decided to write it from scratch for iOS devices and I will add new things over time.
It’ been released a week ago and I’m playing it daily.

A currently pending release, yet to be approved by Apple, adds Game Center support and a global Leaderboard so you can compare your skills with others around the world.






[Android] HushSMS v2.7.7 (bugfix release)

It’s been a while and due to a lot of other stuff and regular workload I was not able to do anything related to HushSMS. However since there where a lot of updates to the Android OS some things messed up in HushSMS. With this release I addressed two very annoying issues.

1. The “allyoumessages…” message in the sent items folder of the SMS application should no read “HushSMS message sent” again
2. Some devices used another API method when sending SMS out and I added this API method. So finally the hand full of users who had problems sending messages with HushSMS are now able to use the App. Sorry for the delay folks and thanks for your patience.

I am planning new features in HushSMS as requested by some users like a history of sent messages and the possibility to define a favorite list where you can put in target and message type combinations for messages you tend to send frequently.

If you have ideas on how to extend the App or if you have features you’d like to see added please don’t hesitate to drop me line.


[iOS] My App Statistics v1.1 is out

Hey folks,

today Apple approved My App Statistics and it is available in the iTunes App Store now. This app was created in the hope that it would be useful to other developers who develop Android apps and sell them in the Google Play Store but use an iPhone as their daily driver. You can get all your sales data from Google Wallet and get them presented in the app including some graphs.

The full description can be read on the product page here.

Or you can head over to the iTunes App Store directly. The app is not free and costs 2.99€ / $2.99:
Apple App Store page

[Android] HushSMS v2.7 is out


– Fixed a bug which prevented HushSMS to work properly on CM11 build after 31.06.2014. It’s working fine again now on latest CM11 nightlies
– Reintegrated Xposed Module into HushSMS. You no longer need to install a separate Xposed Module APK. Please disabled/uninstall the old module in Xposed Framework prior to using v2.7



[Android] Simple Secure Notes released

Simple Secure Notes stores your thoughts as encrypted text files, ready to be synced to your cloudspace of choice.

It is available in the Google Play Store for 99 Cents (€/$).

It stores your data AES256 encrypted in txt files. You can then use tools like FolderSync to sync your notes to owncloud, dropbox, drive or whatever cloudspace you use.

Regain your privacy! NOW!

[Android] HushSMS removed from Google Play Store and AndroidPit

Wow! That was a day. On December 03, 2013 Google as well as AndroidPit decided to remove (final decision) HushSMS from their stores. AndroidPit didn’t even send me an email or something. Google complained about some policy violations like that it’s a dangerous app. Well that’s bullshit. In coincidence they have patched the Class0 SMS vulnerability in the android source (https://android-review.googlesource.com/#/c/71102/) discovered by Bogdan Alecu a few hours before they pulled HushSMS from the Play Store.
A few days before that all Bogdan came up with the idea of writing a protection app for the vulnerability prior to making it public during DefCamp. I wrote the app (Class0Firewall) and released it for free and of course without ads in the Google Play Store so that owners of the vulnerable Nexus devices can protect themselves.
Hey Google, that’s not the right way to say: “Thank you for protecting my Nexus Device customers.”
What disturbs me most is the fact that there are other SMS programs in the Play Store that are able to send Flash or Class0 messages. HushSMS is nothing illegal nor abuses it the GSM network. Come on Google, read the 3GPP TS23.040 Technical realization of the Short Message Service and the OMA WAP Papers. Compare the specifications to the features of HushSMS and discover that there is nothing dangerous with it. Sorry Google, I forgot that it’s easier to remove something than to use the brain device and think.

[Android] HushSMS now with Tasker Action Plugin

I have integrated a Tasker Action Plugin. You can now define an action in Tasker to send a Class0 (Flash) SMS or Replace Messages. You will receive a Toast message if the SMS is sent and the usual notification icon if the message was delivered successfully.

If you want more message type to be available in Tasker just write me an email or a comment and I will see what I can do.

[Android] HushSMS Xposed Helper Module

With a million thanks to rovo89 for the Xposed Framework, and androcheck from the XDA-Developers Community!!!

I’m proud to announce the availability of an Xposed Module for HushSMS which allows devices without the specific API method to send all message types.

– Root (for Xposed to work)
– Installed and working version of the Xposed Framework (from here: http://forum.xda-developers.com/showthread.php?t=1574401)

How to use it:
Download and install the Module (from here). Current version is 1.7.8. Go into Xposed Framework and then into modules and enable the module. Reboot your device. You’re done! Please send yourself a class 0 message first to see if everything is working as expected. If you see a message text which contains “allyourmessagesarebelongtous” then something went wrong with the Xposed module. Please verify that the module is enabled and you have rebooted your device. If it is still not working please send me the debug log from Xposed. You can find it under /data/xposed/debug.log or /data/data/de.robv.android.xposed.installer/og/debug.log

HushSMS can currently not check if the module is loaded. So you will have to take look yourself in the Xposed Framework. Don’t blame me if you sent out messages without having the module enabled! 🙂

[Android] HushSMS ROOT Edition released

UPDATE: This App will no longer be maintained. Please use the Xposed Plugin instead

I am aware of so many users wanting all HushSMS features for their devices even if their ROM does not provide the API. Well, the wait is over…if you’re willing to switch to a CM based ROM.

(INFO: If you have access to the ROM signing keys for the ROM you use, you can simply unsingn the HushSMS-ROOT.apk and resign it with the singning keys from your ROM and everything should be fine. At keast in theory as I have not tried this way)

Why only CM?

Short answer: Because the app has to be a system app and the signing keys for CM are public.

Long answer: The sendRawPdu API has been removed since ages and only some devices like HTC with Sense still have it available. There is still one class that has this API method available. It’s the SMSDispatcher class. Unfortunately this class is hidden and internal making it only available to system apps. To become a system app, the app in question has to be signed with the manufacturers key and need to be installed in the /system/app path. This key is only available for CM and obviously not for original ROMs like from Samsung, LG or HTC.

HushSMS ROOT Edition only supports three types of messages. To be exact these are the ones that are missing in the market version on devices which do not support the above mentioned API method. Why not all message types you ask? Well, HushSMS ROOT Edition needs to use the following in the Manifest to function properly:




This is necessary to access the SMSDispatcher. Unfortunately the com.android.phone UID is not allowed to use the permission android.permission.SEND_SMS because it has been set with the enforceCallingPermission instead of enforceCallingOrSelfPermission in the IccSmsInterfaceManager class but this is needed to use the sendData API method. Because of this the permission requested by HushSMS ROOT Edition is ignored. So why the hell am I not reflecting this method from the SMSDispatcher also? Because it is declared as an abstract and cannot be reflected.
As you see above I really tried the best to get this working as comfortable as possible, but I am limited to what the OS allows me to do with it’s APIs.

So how do you install this app on your shiny CM powered device now?

I made a post over at XDA dev which I will c&p here for simplicities sake.

– Make sure you have installed the official play store version. HushSMS ROOT Edition will not work without the official version installed.
– Download HushSMS-ROOT.apk from here
– Copy it to your PC/MAC
– Connect your phone via USB
– Open a console and change to the dir where you saved the file
– Type “adb root” (without the quotes of course)
– Then type “adb remount”
– Then type “adb push HushSMS-ROOT.apk /system/app/”

After that you should be able to start the app right from your drawer. If you can’t see it just reboot your device.

You will now be able to send the following message types:
– Class 0 (Flash SMS)
– Type 0 (Silent Ping)
– Message Waiting Indicator for Voice Messages activation and deactivation messages

If something goes wrong, feel free to contact me. I’m always willing to help and fix things as soon as I get a chance.

PS: If you can open the app but nothing happens if you try to send a message double check that you have the official play store version of HushSMS installed.


[HowTo] Install Metasploit (and other usefull stuff) under archlinuxarm on your Android device

A thread on XDA-Devs by user flashdrv [1] catched my attention on this topic. I read through the there mentioned blog entry from Lance R. Vick [2] and looked at the stuff on archlinux.org [3]. This was something that I wanted. So let’s start getting it up:

– On your linux workstation (or bootable cd) download the Archlinuxarm disk image for exynos (= my galaxy note 10.1, or for other cpus see here: http://archlinuxarm.org/platforms) here: http://archlinuxarm.org/os/ArchLinuxARM-odroidx-latest.img.gz

– Other platforms might have a TAR file instead of a full disk image. In this case skip a few steps an d head over to lrvick’s guide below.

– install (#sudo apt-get install kpartx) and use kpartx like follows:

#kpartx ArchLinuxARM-odroidx-latest.img
loop0p1 : 0 8191 /dev/loop0 1
loop0p2 : 0 106496 /dev/loop0 8192
loop0p3 : 0 6291456 /dev/loop0 114688

#kpartx -a -v ArchLinuxARM-odroidx-latest.img
add map loop0p1 (253:0): 0 8191 linear /dev/loop0 1
add map loop0p2 (253:1): 0 106496 linear /dev/loop0 8192
add map loop0p3 (253:2): 0 6291456 linear /dev/loop0 114688

#mkdir /mnt/archlinuxarm
#mount /dev/mapper/loop0p3 /mnt/archlinuxarm
#cd /mnt/archlinuxarm
#tar czf archlinux.tgz ./*

– copy and extract the resulting tgz to your device (folder /data/local/arch)

#cd /data/local/arch
#tar xzf archlinux.tgz

– now follow the excellent guide at http://lrvick.net/blog/arch_linux_terminals_in_android/

– after everthing is up and running do the following to get metasploit installed (you have to already be in archlinuxarm chroot)
– pulling the msf svn will take some hours so relax and take a nap or do something else

#pacman -S ruby
#pacman -S zlib
#pacman -S uniconvertor
#pacman -S svn
#cd /opt
#svn co https://www.metasploit.com/svn/framework3/trunk/ msf3
#cd msf3/

– you’re done if you can see the msfconsole running
– go and install additional packages like
– nmap (#pacman -S nmap)
– kismet (#pacman -S kismet)
– aircrack-ng (#pacman -S aircrack-ng)
– ettercap (#pacman -S ettercap)
– etc. (you can search for packages here: http://archlinuxarm.org/packages)

– If you get a problem that your user cannot access network stuff see [4]

– If you want DB support in metasploit you can it like follows:
– Install some needed stuff

#pacman -S postgresql
#pacman -S gcc
#pacman -S make
#gem install pg

– This will allow you to set up the db and use it in Metasploit (google for the setup procedure)

[1] http://forum.xda-developers.com/showthread.php?t=2015812
[2] http://lrvick.net/blog/arch_linux_terminals_in_android/
[3] http://archlinuxarm.org/
[4] https://blog.tuinslak.org/socket-permission-denied