לוח שנה עברי – com.sec.jewishcalendar

Download Links:

com.sec.jewishcalendar_v2.0.2.apk

com.sec.jewishcalendar_v2.0.4.apk

com.sec.jewishcalendar_v3.0.0.apk


It is mostly found within the cache.img of phones,
with ILO/CEL within the app folder. If you have such a firmware,
and you are able to extract it (you need to convert it to ex4, than
use DiskInternals Linux Reader ver2.0.0.0 (not newer versions)
to extract the archive and the apps inside,
preferably it should be deodxed so people could use it without dependencies.

Synapse Knox Missed Packages

icompile.eladkarako.com_2016-03-06_021628

Enterprise / Knox / Folder Isolation Related-Packages
That You Should Disable After Choosing “Disable Knox” From Synapse’s Security-Menu.

successfully disabled by Synapse (om.af.synapse)

com.google.android.talk
com.policydm
com.samsung.android.app.watchmanager
com.samsung.android.dlp.service
com.samsung.android.securitylogagent
com.samsung.klmsagent
com.samsung.knox.appsupdateagent
com.samsung.knox.rcp.components
com.sec.android.emergencylauncher
com.sec.enterprise.knox.attestation
com.sec.enterprise.knox.cloudmdm.smdms
com.sec.enterprise.knox.myknoxsetupwizard
com.sec.knox.foldercontainer
com.sec.knox.knoxsetupwizardclient
com.sec.knox.switcher

need to do it manually

com.samsung.aasaservice
com.samsung.android.bbc.bbcagent
com.samsung.android.dlp.service
com.samsung.knox.knoxtrustagent
com.samsung.knox.kss
com.sds.emm.dmmonitor
com.sec.enterprise.app.knoxvpn
com.sec.enterprise.mdm.services.simpin
com.sec.enterprise.mdm.vpn
com.sec.esdk.elm
com.sec.knox.app.container
com.sec.knox.bridge
com.sec.knox.containeragent
com.sec.knox.containeragent2
com.sec.knox.eventsmanager
com.sec.knox.knoxsetupwizardclient
com.sec.knox.packageverifier
com.sec.knox.seandroid
com.sec.knox.setupwizardstub
com.sec.knox.shortcutsms
com.sec.knox.store
com.sec.knox.switchknox
com.sec.knox.switchknoxI
com.sec.knox.switchknoxII
com.sec.knox.switchknoxIII
com.sec.knox.switchknoxIIV
com.sec.knox.switchknoxIV
com.sec.knox.switchknoxV
com.sec.knox.switchknoxVI
com.sec.knox.switchknoxVII
com.skms.android.agent
com.samsung.android.irm.service

– activate USB debugging.
– connect your phone using USB (or network..) run adb devices
– run adb shell
– – run su [ENTER]
– – run pm disable ___package name____
(replace “___package name____” with the package-names above)
– – run exit and again exit until you’ll be back to your Windows’s CMD (or if you’re using *nix — the terminal..).
– – – if you are using TWRP you can use its terminal for an extra clean results (before first-boot!)

– reboot your device.

BOOTCLASSPATH For Note 5 Lollipop SM-N920C

Placed under root, in init.environ.rc file (instead of usual init.rc)

The entire file’s content:

# set up the global environment
on init
    export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin
    export ANDROID_BOOTLOGO 1
    export ANDROID_ROOT /system
    export ANDROID_ASSETS /system/app
    export ANDROID_DATA /data
    export ANDROID_STORAGE /storage
    export ASEC_MOUNTPOINT /mnt/asec
    export LOOP_MOUNTPOINT /mnt/obb
    export BOOTCLASSPATH /system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/mms-common.jar:/system/framework/android.policy.jar:/system/framework/apache-xml.jar:/system/framework/sec_edm.jar:/system/framework/sagearpolicymanager.jar:/system/framework/seccamera.jar:/system/framework/scrollpause.jar:/system/framework/stayrotation.jar:/system/framework/smartfaceservice.jar:/system/framework/timakeystore.jar:/system/framework/fipstimakeystore.jar:/system/framework/secocsp.jar:/system/framework/commonimsinterface.jar:/system/framework/imsmanager.jar:/system/framework/secEmailBC.jar:/system/framework/sprengine.jar:/system/framework/smartbondingservice.jar:/system/framework/knoxvpnuidtag.jar:/system/framework/sec_sdp_sdk.jar:/system/framework/simageis.jar
    export SYSTEMSERVERCLASSPATH /system/framework/services.jar:/system/framework/ethernet-service.jar:/system/framework/wifi-service.jar
    export LD_PRELOAD libsigchain.so

classpath only: (You can select it all using [CTRL]+[A])

/system/framework/core-libart.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/ims-common.jar:/system/framework/mms-common.jar:/system/framework/android.policy.jar:/system/framework/apache-xml.jar:/system/framework/sec_edm.jar:/system/framework/sagearpolicymanager.jar:/system/framework/seccamera.jar:/system/framework/scrollpause.jar:/system/framework/stayrotation.jar:/system/framework/smartfaceservice.jar:/system/framework/timakeystore.jar:/system/framework/fipstimakeystore.jar:/system/framework/secocsp.jar:/system/framework/commonimsinterface.jar:/system/framework/imsmanager.jar:/system/framework/secEmailBC.jar:/system/framework/sprengine.jar:/system/framework/smartbondingservice.jar:/system/framework/knoxvpnuidtag.jar:/system/framework/sec_sdp_sdk.jar:/system/framework/simageis.jar

it is useful if you are using smali/baksmali to reverse engineer or deodex apks.

APKTOOL Hidden Advance Command Line Switches

Apktool v2.0.2 – a tool for reengineering Android apk files
with smali v2.0.8 and baksmali v2.0.8
Copyright 2014 Ryszard Wi?niewski
Updated by Connor Tumbleson
Apache License 2.0 (http://www.apache.org/licenses/LICENSE-2.0)

usage: apktool [-q|–quiet OR -v|–verbose]
-advance,–advanced prints advance information.
-version,–version prints the version then exits
usage: apktool [-q|–quiet OR -v|–verbose] if|install-framework [options]
-p,–frame-path

Stores framework files into .
-t,–tag Tag frameworks using .
usage: apktool [-q|–quiet OR -v|–verbose] d[ecode] [options]
–api The numeric api-level of the file to generate, e.g. 14 for ICS.
-b,–no-debug-info don’t write out debug info (.local, .param, .line, etc.)
-d,–debug Decode in debug mode. Check project page for more info.
–debug-line-prefix Smali line prefix when decoding in debug mode. Default is “a=0;// “.
-f,–force Force delete destination directory.
-k,–keep-broken-res Use if there was an error and some resources were dropped, e.g.
“Invalid config flags detected. Dropping resources”, but you
want to decode them anyway, even with errors. You will have to
fix them manually before building.
-m,–match-original Keeps files to closest to original as possible. Prevents rebuild.
-o,–output The name of folder that gets written. Default is apk.out
-p,–frame-path
Uses framework files located in .
-r,–no-res Do not decode resources.
-s,–no-src Do not decode sources.
-t,–frame-tag Uses framework files tagged by .
usage: apktool [-q|–quiet OR -v|–verbose] b[uild] [options]
-a,–aapt Loads aapt from specified location.
-c,–copy-original Copies original AndroidManifest.xml and META-INF. See project page for more info.
-d,–debug Builds in debug mode. Check project page for more info.
-f,–force-all Skip changes detection and build all files.
-o,–output The name of apk that gets written. Default is dist/name.apk
-p,–frame-path
Uses framework files located in .
usage: apktool [-q|–quiet OR -v|–verbose] publicize-resources
Make all framework resources public.

For additional info, see: http://ibotpeaches.github.io/Apktool/
For smali/baksmali info, see: http://code.google.com/p/smali/

Make The Previous Post A Mass APK Installer That Does Not Uses ADB Install-Multi Syntax

@echo off

:loop
      ::-------------------------- has argument ?
      if ["%~1"]==[""] (
        echo done.
        goto end
      )
      ::-------------------------- argument exist ?
      if not exist %~s1 (
        echo error "%~1" does not exist in file-system.
      ) else (
        echo "%~1" exist
        if exist %~s1\NUL (
          echo "%~1" is a directory
        ) else (
          echo "%~1" is a file! - time to install:
          call adb install %~s1
        )
      )
      ::--------------------------
      shift
      goto loop
      
      
:end

pause

::: ##########################################################################
::: ##                                                                      ##
::: ##  0. run:   adb devices   - to start the deamon and list your device  ##
::: ##                                                                      ##
::: ##  1. drag&drop ANY amount of files (APK) over this batch files,       ##
::: ##                                                                      ##
::: ##       - it will install them one by one.                             ##
::: ##       - it just checks if file exists.                               ##
::: ##       - it does not checks if it is a valid APK package              ##
::: ##       - it does not checks if package-already-installed              ##
::: ##       - if there is an error you can always press [CTRL]+[C]         ##
::: ##           to stop the script, and continue from the next one,        ##
::: ##           some other time.                                           ##
::: ##       - the file is copied as DOS's 8.3 naming to you                ##
::: ##           don't need to worry about wrapping file names or renaming  ##
::: ##           them, just drag&drop them over this batch.                 ##
::: ##                                                                      ##
::: ##                                   Elad Karako 1/1/2016               ##
::: ##                                   http://icompile.eladkarako.com     ##
::: ##########################################################################

also posted on StackOverflow

Samsung Note 3 N900 – Custom Recovery, Supersu Binary, SuperUser APK, Mount System R/W, Disable KNOX, Remove Bloatware

root1

  • Install a custom-recovery
    • turn off the phone, wait for full shutdown (no screen/LED indicator)
    • hold [volume down]+[home button]+[power button]
    • press [volume up] on this screen
      2014-11-23_183019
    • on your pc: uninstall KIES package (if exist..), and install plain drivers from http://developer.samsung.com/technical-doc/view.do?v=T000000117
    • on your pc: download odin: Odin3_v3_07.rar, extract it anywhere.
    • on your pc: download this version of TWRP custom recovery (better then clockwork’s): openrecovery-twrp-2.6.3.7-ha3g.img.rar, extract it anywhere (but just once, you need to end up with tar file, don’t extract the tar file itself).
    • plug in your phone to USB2.0 port (don’t use USB3.0), wait for drivers installation to finish.
    • right click Odin3-v3.07.exe and select “Run as administrator”
    • on odin, click the PDA button, load the tar file, press start wait till finish.
    • the phone will restart (done).
  • install supersu binary “package”