Use APKPure App
Get Mobile Secret Codes old version APK for Android
scan your device and discover hidden features, hidden codes and infos.
Scan your android device and unlock hidden features, info, codes and hacks, you didn't know before.
Now it's not necessary to remember all those codes. With Mobile Secret Codes you can execute them directly with one finger tap!
The simplest is to directly enter them in the dialer app.
Access all mobile secret menu, hidden codes or menu easily, just tap! Discover hidden functionalities and enjoy! And have fun!
This App will help to find out the USSD Codes for All Mobile operators in all country.
Example:
-field mode, general test mode, IMEI number, check call forwarding, SMS message center, activate call waiting, Quick test menu,
Get easily your device information with Mobile Secret Codes:
- Operating system information (builds release, finger print, build Id...etc.);
- Screen information (height pixels, width pixels);
- Drawable information (icon original height and width)
- Device information (brand, manufacturer, model...etc.)
- Density information
Get easily Test device information with Mobile Secret Codes :
Vibration, Flashlight, Sensor, Battery, Bluetooth, Wifi, Brightness.
Mobile Secret Codes: List all secret codes (Hidden Menu) on your device.
Firmware: Browse for the stock firmware’s available online, for your phone and for any other mobile model.
Available manufacturers: Samsung, Sony, Oppo, HTC, LG, Motorola, Nokia, Apple and other
Main Features: Displays the following information about your phone.
▪ General Info:
- Manufacturer / Brand
- Phone Model
- Device Type
- Product Name
- Country of Origin
- Manufacturing Date
- Knox Warranty Void
- Color / Internal Storage
▪ CSC INFO:
- Product Code
- Original CSC Code
- Firmware's CSC Code
- Active CSC Code
- Avalables CSC Codes
- CSC Country
- Mobile Operator
▪ FIRMWARE INFO:
- Bootloader Version
- PDA Version
- CSC Version
- Baseband Version
- Latest Firmware
- Kernel Version / Architecture (32/64-bit)
- Java Virtual Machine (Dalvik or ART)
▪ OS INFO:
- Root Existence
- Android Version
- Build Number
- Build Fingerprint
- Build Description
- Build Date
- Change list
▪ HARDWARE INFO:
- Hardware / Board (CPU 32/64-bit)
- Platform / Chip
- GPU (Graphics Processing Unit)
- Modem Board
- Hardware Revision
- Total RAM
- Screen (physical size in inches, resolution in pixels, density in dpi and ppi)
- Sound Card
- Camera
- Sensors
- Battery (technology, capacity in mAh, health)
▪ DEVICE ID:
- IMEI
- Android Serial Number
- Samsung Serial Number
▪ USAGE HISTORY:
- Headset Connect Counter
- Charger Connect Counter (root required)
- S Pen Detach Counter (root required, for Galaxy Note series only)
▪ MONITOR:
- CPU/Battery/Ambient temperatures
- CPU/Memory usages
- Battery voltage/level
- Signal strength
One of the most common practices amongst today’s software developers is to leave certain kind of “backdoors” within operating systems. These “backdoors” essentially allow any users with sufficient knowledge to get into the system at a much deeper level than you’d expect from normal users. These backdoors aren’t always meant to be used for malicious intent, as they allow programmers to get into the system for troubleshooting when other usual access modes have been blocked. And to developers, they can be quite friendly and helpful if you know what you’re doing. In smartphones these backdoor are called “secret codes”.
IMPORTANT! Some manufacturers do not allow the use of these codes and they may not work on your device. By using secret codes you can modify certain parameters of your device. Use at your own risk!
Last updated on Jul 6, 2017
some brand's code's changed
some bug fixed
Uploaded by
Orissbel Olivares
Requires Android
Android 3.2+
Category
Report