Discover

Topics

Mobile Secret Codes

Mobile Secret Codes APK

Mobile Secret Codes APK

5 Freekingdev17 ⇣ Download APK (5.07 MB)

scan your device and discover hidden features, hidden codes and infos.

What's Mobile Secret Codes APK?

Mobile Secret Codes is a app for Android, It's developed by kingdev17 author.
First released on google play in 7 years ago and latest version released in 6 years ago.
This app has 769.8K download times on Google play and rated as 4.25 stars with 2,628 rated times.
This product is an app in Tools category. More infomartion of Mobile Secret Codes on google play
Scan your android device and unlock hidden features, info, codes and hacks, you didn't know before.
Now it's not necessary to remember all those codes. With Mobile Secret Codes you can execute them directly with one finger tap!
The simplest is to directly enter them in the dialer app.
Access all mobile secret menu, hidden codes or menu easily, just tap! Discover hidden functionalities and enjoy! And have fun!
This App will help to find out the USSD Codes for All Mobile operators in all country.

Example:
-field mode, general test mode, IMEI number, check call forwarding, SMS message center, activate call waiting, Quick test menu,
Get easily your device information with Mobile Secret Codes:
- Operating system information (builds release, finger print, build Id...etc.);
- Screen information (height pixels, width pixels);
- Drawable information (icon original height and width)
- Device information (brand, manufacturer, model...etc.)
- Density information

Get easily Test device information with Mobile Secret Codes :
Vibration, Flashlight, Sensor, Battery, Bluetooth, Wifi, Brightness.
Mobile Secret Codes: List all secret codes (Hidden Menu) on your device.
Firmware: Browse for the stock firmware’s available online, for your phone and for any other mobile model.
Available manufacturers: Samsung, Sony, Oppo, HTC, LG, Motorola, Nokia, Apple and other
Main Features: Displays the following information about your phone.

▪ General Info:
- Manufacturer / Brand
- Phone Model
- Device Type
- Product Name
- Country of Origin
- Manufacturing Date
- Knox Warranty Void
- Color / Internal Storage

▪ CSC INFO:
- Product Code
- Original CSC Code
- Firmware's CSC Code
- Active CSC Code
- Avalables CSC Codes
- CSC Country
- Mobile Operator

▪ FIRMWARE INFO:
- Bootloader Version
- PDA Version
- CSC Version
- Baseband Version
- Latest Firmware
- Kernel Version / Architecture (32/64-bit)
- Java Virtual Machine (Dalvik or ART)

▪ OS INFO:
- Root Existence
- Android Version
- Build Number
- Build Fingerprint
- Build Description
- Build Date
- Change list

▪ HARDWARE INFO:
- Hardware / Board (CPU 32/64-bit)
- Platform / Chip
- GPU (Graphics Processing Unit)
- Modem Board
- Hardware Revision
- Total RAM
- Screen (physical size in inches, resolution in pixels, density in dpi and ppi)
- Sound Card
- Camera
- Sensors
- Battery (technology, capacity in mAh, health)

▪ DEVICE ID:
- IMEI
- Android Serial Number
- Samsung Serial Number

▪ USAGE HISTORY:
- Headset Connect Counter
- Charger Connect Counter (root required)
- S Pen Detach Counter (root required, for Galaxy Note series only)

▪ MONITOR:
- CPU/Battery/Ambient temperatures
- CPU/Memory usages
- Battery voltage/level
- Signal strength

One of the most common practices amongst today’s software developers is to leave certain kind of “backdoors” within operating systems. These “backdoors” essentially allow any users with sufficient knowledge to get into the system at a much deeper level than you’d expect from normal users. These backdoors aren’t always meant to be used for malicious intent, as they allow programmers to get into the system for troubleshooting when other usual access modes have been blocked. And to developers, they can be quite friendly and helpful if you know what you’re doing. In smartphones these backdoor are called “secret codes”.
IMPORTANT! Some manufacturers do not allow the use of these codes and they may not work on your device. By using secret codes you can modify certain parameters of your device. Use at your own risk!