From 7e2977965c4bbee66c2bdc71373686ef08d88df6 Mon Sep 17 00:00:00 2001 From: nbats <44333466+nbats@users.noreply.github.com> Date: Thu, 20 Apr 2023 13:10:25 -0700 Subject: [PATCH] =?UTF-8?q?Updated=20=F0=9F=93=B1=20Android=20=20=20iOS=20?= =?UTF-8?q?(markdown)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 📱-Android---iOS.md | 1 + 1 file changed, 1 insertion(+) diff --git a/📱-Android---iOS.md b/📱-Android---iOS.md index 73503f05..50f4e0f1 100644 --- a/📱-Android---iOS.md +++ b/📱-Android---iOS.md @@ -550,6 +550,7 @@ https://www.whosaidthat.uk/ * [Odin3](https://forum.xda-developers.com/showthread.php?t=2711451), [SkyHawk](https://skyhawkrecovery.github.io/) / [GitHub](https://github.com/SHRP), [PitchBlack](https://pitchblackrecovery.com/) or [OrangeFox](https://wiki.orangefox.tech/en/home) / [GitHub](https://gitlab.com/OrangeFox/misc/appdev/app) - Custom Recovery Firmware * [TWRP Root](https://twrp.me/) / [Telegram](https://t.me/samsung_twrp_root/78379) or [UnofficialTWRP](https://unofficialtwrp.com/) - TWRP Root * [SamFirm A.I.O​](https://forum.xda-developers.com/t/tool-samfirm-a-i-o-tools-firmware-downloader-mtp-bypass-frp.4210103/), [samsung-frp-bypass-project](https://github.com/pubuduprasad/samsung-frp-bypass-project-) or [Firmwareland](https://firmwareland.com/) - Firmware / FRP Bypass +* [Eureka](https://eurekadevelopment.github.io/) - Samsung Exynos Modding Community * [Frida-Mobile-Scripts](https://github.com/m0bilesecurity/Frida-Mobile-Scripts) - FRIDA Mobile Scripts * [Android OTP Extractor](https://github.com/puddly/android-otp-extractor) - Extract OTP Tokens * [Hash Droid](https://play.google.com/store/apps/details?id=com.hobbyone.HashDroid) - File Hash Calculator