nexmon

The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more

https://github.com/seemoo-lab/nexmon

Science Score: 59.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
    Found 4 DOI reference(s) in README
  • Academic publication links
    Links to: arxiv.org, acm.org
  • Committers with academic emails
    3 of 24 committers (12.5%) from academic institutions
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (9.9%) to scientific vocabulary

Keywords

broadcom firmware framework nexmon patching rpi smartphone
Last synced: 6 months ago · JSON representation

Repository

The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more

Basic Info
  • Host: GitHub
  • Owner: seemoo-lab
  • License: gpl-3.0
  • Language: C
  • Default Branch: master
  • Size: 375 MB
Statistics
  • Stars: 2,599
  • Watchers: 154
  • Forks: 471
  • Open Issues: 339
  • Releases: 1
Topics
broadcom firmware framework nexmon patching rpi smartphone
Created over 9 years ago · Last pushed 8 months ago
Metadata Files
Readme License Citation Security

README.md

NexMon logo

What is nexmon?

Nexmon is our C-based firmware patching framework for Broadcom/Cypress WiFi chips that enables you to write your own firmware patches, for example, to enable monitor mode with radiotap headers and frame injection.

Below, you find an overview what is possible with nexmon. This repository mainly focuses on enabling monitor mode and frame injection on many chips. If you want additional features, the following projects might be interesting for you:

  • http://nexmon.org/jammer: A real Wi-Fi jammer that allows to overlay ongoing frame transmissions with an arbitrary jamming signal.
    • It uses the Wi-Fi chip as a Software-defined Radio to generate jamming signals
    • It allows using non-standard channels such as 80 MHz bandwidth in the 2.4 GHz bands
    • It allows to set arbitrary transmission powers
    • It allows patching the D11 core's real-time MAC implementation
  • http://nexmon.org/csi: Channel State Information extractor for various Wi-Fi chips
    • It allows to extract CSI of up to 4x4 MIMO transmissions at 80 MHz bandwidth
  • http://nexmon.org/debugger: Debugging ARM microcontrollers without JTAG access
    • It allows low-level access to debugging registers to set breakpoints and watchpoints and allows single stepping
  • http://nexmon.org/covert_channel: Covert Channel that hides information in Wi-Fi signals
    • More advanced Software-defined Radio capabilities than the jammer
    • Example application for channel state information extraction
  • http://nexmon.org/sdr: Use your Wi-Fi chip as Software-defined Radio
    • Currently only transmissions are working in both 2.4 and 5 GHz Wi-Fi bands

NexMon logo

WARNING

Our software may damage your hardware and may void your hardwares warranty! You use our tools at your own risk and responsibility! If you don't like these terms, don't use nexmon!

Supported Devices

The following devices are currently supported by our nexmon firmware patch.

WiFi Chip | Firmware Version | Used in | Operating System | M | RT | I | FP | UC | CT ------------------------- | -------------------- | ------------------------- | ---------------------------- | --- | --- | --- | --- | --- | --- bcm4330 | 59010041sta | Samsung Galaxy S2 | Cyanogenmod 13.0 | X | X | | X | X | O bcm4335b0 | 6.30.171.1sta | Samsung Galaxy S4 | LineageOS 14.1 | X | X | X | | X | O bcm4339 | 6373443 | Nexus 5 | Android 6 Stock | X | X | X | X | X | O bcm43430a11 | 7454126 | Raspberry Pi 3 and Zero W | Raspbian 8 | X | X | X | X | X | O bcm43430a11 | 7454146 | Raspberry Pi 3 and Zero W | Raspbian Stretch | X | X | X | X | X | O bcm43439a07 | 79549 (2271bb6 CY) | Raspberry Pi Pico W | Pico SDK | X | X | | X | X |
bcm43451b1 | 763430 | iPhone 6 | iOS 10.1.1 (14B100) | | | | X | X |
bcm43455 | 7
45770hw | Huawei P9 | Android 7 Stock | X | X | X | X | X |
bcm43455 | 7
12051staC0 | Galaxy J7 2017 | ? | | | | X | X |
bcm43455 | 745770hw(8-2017) | Huawei P9 | Android 7 Stock | X | X | X | X | X |
bcm434555 | 7467711hw | Huawei P9 | Android 8 China Stock | X | X | X | X | X |
bcm43455 | 7455916 | Sony Xperia Z5 Compact | LineageOS 14.1 | X | X | X | X | X |
bcm43455c0 | 7
45154 | Raspberry Pi B3+/B4 | Raspbian Kernel 4.9/14/19 | X | X | | X | X |
bcm43455c0 | 7
45189 | Raspberry Pi B3+/B4 | Raspbian Kernel 4.14/19, 5.4 | X | X | | X | X |
bcm43455c0 | 7
45206 | Raspberry Pi B3+/B4 | Raspberry Pi OS Kernel 5.4 | X | X | X | X | X |
bcm43455c0 | 7
45234 (4ca95bb CY)| Raspberry Pi B3+/B4/5 | Raspberry Pi OS | | | | X | X |
bcm43436b03 | 9
88465 | Raspberry Pi Zero 2 W | Raspberry Pi OS Kernel 5.10 | X | X | X | X | X |
bcm4356 | 7351015sta | Nexus 6 | Android 7.1.2 | X | X | | X | X | O bcm4358 | 711220017sta | Nexus 6P | Android 7 Stock | X | X | | X | X | O bcm4358 | 71122013sta | Nexus 6P | Android 7.1.2 Stock | X | X | | X | X | O bcm43582 | 711230014sta | Nexus 6P | Android 8.0.0 Stock | X | X | X | X | X | O bcm43596a03 | 97515545stac0 | Samsung Galaxy S7 | Android 7 Stock | X | | | O | X |
bcm43596a03,2 | 9
964stac0 | Samsung Galaxy S7 | LineageOS 14.1 | X | X | X | O | X |
bcm4375b13,5,6 | 18
3818sta | Samsung Galaxy S10 | Rooted + disabled SELinux | X | X | X | O | X |
bcm4375b13,5,6 | 184189sta | Samsung Galaxy S20 | Rooted + disabled SELinux | X | X | X | O | X |
bcm4389c15,8,9 | 208242sta (r994653) | Samsung Galaxy S22 Plus | Android 14, Rooted with Magisk | | | | X | X |
bcm4389c15,8,9 | 20
101362 (r994653)| Google Pixel 7 and 7 Pro | Rooted with Magisk | | | | X | X |
bcm4389c15,8,9 | 2010157 (r1035009)| Google Pixel 7 and 7 Pro | Rooted with Magisk | | | | X | X |
bcm4398d05,8,9 | 2467169 (r1031525)| Google Pixel 8 | Rooted with Magisk | | | | X | X |
bcm6715b05 | 17
101886401 (r808804)| Asus RT-AX86U Pro | Stock firmware 3.0.0.4388.23565 | | | | / | X |
qca95004 | 4-1-0
55 | TP-Link Talon AD7200 | Custom LEDE Image | | | | | |

1 bcm43430a1 was wrongly labeled bcm43438 in the past.

2 use LDPRELOAD=libnexmon.so instead of LDPRELOAD=libfakeioctl.so to inject frames through ioctls

3 flash patches need to be 8 bytes long and aligned on an 8 byte boundary

4 802.11ad Wi-Fi chip from first 60 GHz Wi-Fi router Talon AD7200. Patch your firmware using nexmon-arc and run it with our custom LEDE image lede-ad7200

5 Disabled the execution protection (called Execute Never) on region 1, because it interferes with the nexmon code (Permission fault on Section)

6 To use nexutil, you need to deactivate SELinux or set it to permissive

7 See pico-nexmon for example applications using Pico SDK with nexmon.

8 flash patches need to be 16 bytes long and aligned on a 16 byte boundary.

9 Uses Magisk module to install firmware, nexutil, and set SELinux policies.

Legend

  • M = Monitor Mode
  • RT = Monitor Mode with RadioTap headers
  • I = Frame Injection
  • FP = Flash Patching
  • UC = Ucode Compression
  • CT = c't Article Support (for consistent support, use our ct-artikel branch)

Steps to create your own firmware patches

Build patches for bcm4330, bcm4339 and bcm4358 using a x86 computer running Linux (e.g. Ubuntu 16.04)

  • Install some dependencies: sudo apt-get install git gawk qpdf adb flex bison
  • Only necessary for x86_64 systems, install i386 libs:

sudo dpkg --add-architecture i386 sudo apt-get update sudo apt-get install libc6:i386 libncurses5:i386 libstdc++6:i386 * Clone our repository: git clone https://github.com/seemoo-lab/nexmon.git * In the root directory of the repository: cd nexmon * Setup the build environment: source setup_env.sh * Compile some build tools and extract the ucode and flashpatches from the original firmware files: make * Go to the patches folder of your target device (e.g. bcm4339 for the Nexus 5): cd patches/bcm4339/6_37_34_43/nexmon/ * Compile a patched firmware: make * Generate a backup of your original firmware file: make backup-firmware * Install the patched firmware on your smartphone: make install-firmware (make sure your smartphone is connected to your machine beforehand)

Using the Monitor Mode patch

  • Install at least nexutil and libfakeioctl from our utilities. The easiest way to do this is by using this app: https://nexmon.org/app. But you can also build it from the source by executing make in the utilties folder (Note: you will need the Android NDK properly installed for this).
  • Connect to your Android phone using the ADB tools: adb shell
  • Make sure you are not connected to an access point
  • Use nexutil to enable monitor mode: nexutil -m2
  • At this point the monitor mode is active. There is no need to call airmon-ng.
  • Important: Most tools need a Radiotap interface to work properly. libfakeioctl emulates this type of interface for you, therefore, use LDPRELOAD to load this library when you call the favourite tool (e.g. tcpdump or airodump-ng): `LDPRELOAD=libfakeioctl.so tcpdump -i wlan0`
  • untested hint: Thanks to XDA member ruleh, there is a bcmdhd driver patch to activate native monitor mode, see: https://github.com/ruleh/misc/tree/master/monitor

Using nexutil over UDP on Nexus 5

To be able to communicate with the firmware without root priviledges, we created a UDP interface accessible through the libnexio, which is also used by nexutil. You first have to prove to the firmware that you generally have root priviledges by setting a security cookie. Then you can use it for UDP based connections. Your wlan0 interface also needs an IP address in the 192.168.222.0/24 range or you have to change the default nexutil broadcast-ip: * Set the IP address of the wlan0 interface: ifconfig wlan0 192.168.222.1 netmask 255.255.255.0 * Set the security cookie as root: nexutil -x<cookie (uint)> * Start a UDP connection for example to activate monitor mode: nexutil -X<cookie> -m1

Build patches for bcm43430a1 on the RPI3/Zero W or bcm434355c0 on the RPI3+/RPI4 or bcm43436b0 on the RPI Zero 2W using Raspbian/Raspberry Pi OS (recommended)

Note: We currently support Kernel Version 4.4 (deprecated), 4.9, 4.14, 4.19, 5.4, 5.10 and 5.15. Raspbian contains firmware version 7.45.154 for the bcm43455c0. We also support the newer firmware release 7.45.189 from Cypress. Raspberry Pi OS contains firmware version 7.45.206. Please, try which works best for you. * Make sure the following commands are executed as root: sudo su * Upgrade your Raspbian installation: apt-get update && apt-get upgrade * Install the kernel headers to build the driver and some dependencies: sudo apt install raspberrypi-kernel-headers git libgmp3-dev gawk qpdf bison flex make autoconf libtool texinfo * Clone our repository: git clone https://github.com/seemoo-lab/nexmon.git * Go into the root directory of our repository: cd nexmon * ### On 32bit Raspbian/Raspberry Pi OS * Check if /usr/lib/arm-linux-gnueabihf/libisl.so.10 exists, if not, compile it from source: * cd buildtools/isl-0.10, ./configure, make, make install, ln -s /usr/local/lib/libisl.so /usr/lib/arm-linux-gnueabihf/libisl.so.10 * Check if /usr/lib/arm-linux-gnueabihf/libmpfr.so.4 exists, if not, compile it from source: * cd buildtools/mpfr-3.1.4, autoreconf -f -i, ./configure, make, make install, ln -s /usr/local/lib/libmpfr.so /usr/lib/arm-linux-gnueabihf/libmpfr.so.4 * ### On 64bit Raspberry Pi OS * sudo dpkg --add-architecture armhf * sudo apt-get update * sudo apt-get install libc6:armhf libisl23:armhf libmpfr6:armhf libmpc3:armhf libstdc++6:armhf * sudo ln -s /usr/lib/arm-linux-gnueabihf/libisl.so.23.0.0 /usr/lib/arm-linux-gnueabihf/libisl.so.10 * sudo ln -s /usr/lib/arm-linux-gnueabihf/libmpfr.so.6.1.0 /usr/lib/arm-linux-gnueabihf/libmpfr.so.4

  • Then you can setup the build environment for compiling firmware patches
    • Setup the build environment: source setup_env.sh
    • Compile some build tools and extract the ucode and flashpatches from the original firmware files: make
  • Go to the patches folder for the bcm43430a1/bcm43455c0/bcm43436b0 chipset: cd patches/bcm43430a1/7_45_41_46/nexmon/ / patches/bcm43455c0/<7_45_154 or 7_45_189>/nexmon/ / cd patches/bcm43436b0/9_88_4_65/nexmon/
    • Compile a patched firmware: make
    • Generate a backup of your original firmware file: make backup-firmware
    • Install the patched firmware on your RPI3: make install-firmware
  • Install nexutil: from the root directory of our repository switch to the nexutil folder: cd utilities/nexutil/. Compile and install nexutil: make && make install.
  • Optional: remove wpasupplicant for better control over the WiFi interface: apt-get remove wpasupplicant
    Also, disabling power saving features (`iw dev wlan0 set power
    save off`) can help prevent firmware crashes.
  • Note: To connect to regular access points you have to execute nexutil -m0 first

Using the Monitor Mode patch

  • Thanks to the prior work of Mame82, you can setup a new monitor mode interface by executing: iw phy `iw dev wlan0 info | gawk '/wiphy/ {printf "phy" $2}'` interface add mon0 type monitor
  • To activate monitor mode in the firmware, simply set the interface up: ifconfig mon0 up.
  • At this point, monitor mode is active. There is no need to call airmon-ng.
  • The interface already set the Radiotap header, therefore, tools like tcpdump or airodump-ng can be used out of the box: tcpdump -i mon0
  • Optional: To make the RPI3 load the modified driver after reboot:
    • Find the path of the default driver at reboot: modinfo brcmfmac #the first line should be the full path
    • Backup the original driver: mv "<PATH TO THE DRIVER>/brcmfmac.ko" "<PATH TO THE DRIVER>/brcmfmac.ko.orig"
    • Copy the modified driver (Kernel 4.9): cp /home/pi/nexmon/patches/bcm43430a1/7_45_41_46/nexmon/brcmfmac_kernel49/brcmfmac.ko "<PATH TO THE DRIVER>/"
    • Copy the modified driver (Kernel 4.14): cp /home/pi/nexmon/patches/bcm43430a1/7_45_41_46/nexmon/brcmfmac_4.14.y-nexmon/brcmfmac.ko "<PATH TO THE DRIVER>/"
    • Probe all modules and generate new dependency: depmod -a
    • The new driver should be loaded by default after reboot: reboot
    • Note: It is possible to connect to an access point or run your own access point in parallel to the monitor mode interface on the wlan0 interface.

How to build the utilities

To build the utilities such as nexmon or dhdutil for Android, you need to download the old NDK version 11c, extract it and export the environment variable NDK_ROOT pointing to the directory where you extracted the NDK files.

How to extract the ROM

The Wi-Fi firmware consists of a read-only part stored in the ROM of every Wi-Fi chip and another part that is loaded by the driver into the RAM. To analyze the whole firmware, one needs to extract the ROM. There are two options to do this. Either you write a firmware patch that simply copies the contents of the ROM to RAM and then you dump the RAM, or you directly dump the ROM after loading the regular firmware into the RAM. Even though, the second option is easier, it only works, if the ROM can be directly accessed by the driver, which is not always the case. Additionally, the firmware loaded into RAM can contain ROM patches that overlay the data stored in ROM. By dumping the ROM after loading the original RAM firmware, it contains flash patches. Hence, the ROM needs to be dumped again for every RAM firmware update to be consistent. As a conclusion, we prefer to dump the clean ROM after copying it to RAM.

Dumping the ROM directly

To dump the ROM directly, you need to know, where to find it and how large it is. On chips with Cortex-M3 it is usually at upper addresses such as 0x800000, while on chips with Cortex-R4 it is likely at 0x0. Run dhdutil to perform the dump: dhdutil membytes -r 0x0 0xA0000 > rom.bin

Dumping a clean ROM after copying to RAM

For the BCM4339 and BCM4358, we created rom_extraction projects that load a firmware patch that copies ROM to RAM and them dumps it using dhdutil. To dump the ROM simply execute the following in the project directory: make dump-rom

After ROM extraction, the rom.bin file will be copies to the corresponding firmwares subdirectory. To apply the flash patches of a specific RAM firmware version, enter its directory and execute: make rom.bin

Structure of this repository

  • buildtools: Contains compilers and other tools to build the firmware
  • firmwares
    • <chip version>
    • <firmware version>
      • <firmware file>: The original firmware that will be loaded into the RAM of the WiFi Chip
      • definitions.mk: Contains mainly firmware specific addresses
      • structs.h: Structures only valid for this firmware version
      • Makefile: Used to extract flashpatches and ucode
      • flashpatches.c (generated by Makefile): Contains flashpatches
      • ucode.bin (extracted by Makefile): Contains uncompressed Ucode
    • structs.common.h: Structures that are common between firmware versions
  • patches
    • <chip version>
    • <firmware version>
      • nexmon
      • Makefile: Used to build the firmware
      • patch.ld: Linker file
      • src
        • patch.c: General patches to the firmware
        • injection.c: Code related to frame injection
        • monitormode.c: Code related to monitor mode with radiotap headers
        • ioctl.c: Handling of custom IOCTLs
        • ...
      • obj (generated by Makefile): Object files created from C files
      • log (generated by Makefile): Logs written during compilation
      • gen (generated by Makefile): Files generated during the build process
        • nexmon.pre (generated by gcc plugin): Extracted at-attributes and targetregion-pragmas
        • nexmon.ld (generated from nexmon.pre): Linker file use to place patch code at defined addresses in the firmware
        • nexmon.mk (generated from nexmon.pre): Make file used take code from patch.elf and place it into firmware
        • flashpatches.ld (generated from nexmon.pre): Linker file that places flashpatches at target locations in firmware ROM
        • flashpatches.mk (generated from nexmon.pre): Make file used to insert flashpatch config and data structures into firmware
        • patch.elf (generated from object files and linker scripts): contains the newly compiled code placed at predefined addresses
    • common
      • wrapper.c: Wrappers for functions that already exist in the firmware
      • ucode_compression.c: tinflate based ucode decompression
      • radiotap.c: RadioTap header parser
      • helper.c: Helpful utility functions
    • driver: Patched brcmfmac driver
    • include: Common include files
      • firmware_version.h: Definitions of chip and firmware versions
      • patcher.h: Macros use to perform patching for existing firmware code (e.g., BPatch patches a branch instruction)
      • capabilities.h: Allows to indicate capabilities (such as, monitor mode and frame injection)
      • nexioctl.h: Defines custom IOCTL numbers

Related projects

  • bcmon: Monitor Mode and Frame Injection for the bcm4329 and bcm4330
  • monmob: Monitor Mode and Frame Injection for the bcm4325, bcm4329 and bcm4330
  • P4wnP1: Highly customizable attack platform, based on Raspberry Pi Zero W and Nexmon
  • kali Nethunter OS: ROM that brings Kali Linux to smartphones with Nexmon support
  • dustcloud-nexmon: Nexmon for Xiaomi IoT devices (ARM based)
  • InternalBlue: Bluetooth experimentation framework based on Reverse Engineering of Broadcom Bluetooth Controllers

Interesting articles on firmware hacks

If you know more projects that use nexmon or perform similar firmware hacks, let us know and we will add a link.

  • Project Zero: Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices
  • broadpwn: Remotely Compromising Android and IOS via a Bug in Broadcom's Wi-Fi Chipsets
  • Project Zero: Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 1)
  • Project Zero: Over The Air: Exploiting Broadcom's Wi-Fi Stack (Part 2)

Read my PhD thesis

Read our papers

Get references as bibtex file

Reference our project

Any use of this project which results in an academic publication or other publication which includes a bibliography should include a citation to the Nexmon project and probably one of our papers depending on the code you use. Find all references in our bibtex file. Here is the reference for the project only: @electronic{nexmon:project, author = {Schulz, Matthias and Wegemer, Daniel and Hollick, Matthias}, title = {Nexmon: The C-based Firmware Patching Framework}, url = {https://nexmon.org}, year = {2017} }

Contact

Powered By

Secure Mobile Networking Lab (SEEMOO)

SEEMOO logo

Networked Infrastructureless Cooperation for Emergency Response (NICER)

NICER logo

Multi-Mechanisms Adaptation for the Future Internet (MAKI)

MAKI logo

Technische Universitt Darmstadt

TU Darmstadt logo

Owner

  • Name: Secure Mobile Networking Lab
  • Login: seemoo-lab
  • Kind: organization
  • Location: Darmstadt, Germany

GitHub Events

Total
  • Commit comment event: 3
  • Issues event: 35
  • Watch event: 202
  • Issue comment event: 150
  • Push event: 3
  • Pull request event: 8
  • Fork event: 24
Last Year
  • Commit comment event: 3
  • Issues event: 35
  • Watch event: 202
  • Issue comment event: 150
  • Push event: 3
  • Pull request event: 8
  • Fork event: 24

Committers

Last synced: 9 months ago

All Time
  • Total Commits: 887
  • Total Committers: 24
  • Avg Commits per committer: 36.958
  • Development Distribution Score (DDS): 0.335
Past Year
  • Commits: 8
  • Committers: 2
  • Avg Commits per committer: 4.0
  • Development Distribution Score (DDS): 0.125
Top Committers
Name Email Commits
Matthias Schulz m****z@s****e 590
Jakob Link j****k@s****e 111
Daniel Wegemer d****l@w****m 60
DrSchottky 6****y 50
Baselsayeh b****h@h****m 21
yvain y****9@g****m 14
Fabian Knapp f****p@s****e 11
MaMe82 m****2@g****m 8
Aaron Gallagher a****r@g****m 3
Jan-Joost den Brinker j****t@a****g 2
Chris c****d@t****m 2
Robin Morawetz r****z@g****m 2
Sebastian Kreuzer B****k 2
Abdullah a****h@a****y 1
Borduni d****r@o****e 1
MattKC 3****c 1
SilverLeo 6****o 1
Yathish y****g@g****m 1
fput f****t 1
imShara s****a@p****m 1
Oussama Romdhane O****o@g****m 1
Daan Sprenkels h****o@d****m 1
thesourcerer8 pg@f****t 1
vollkorntomate t****s@v****e 1

Issues and Pull Requests

Last synced: 6 months ago

All Time
  • Total issues: 102
  • Total pull requests: 36
  • Average time to close issues: 4 months
  • Average time to close pull requests: 2 months
  • Total issue authors: 79
  • Total pull request authors: 26
  • Average comments per issue: 5.91
  • Average comments per pull request: 1.31
  • Merged pull requests: 8
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 24
  • Pull requests: 9
  • Average time to close issues: 7 days
  • Average time to close pull requests: 4 days
  • Issue authors: 18
  • Pull request authors: 6
  • Average comments per issue: 3.75
  • Average comments per pull request: 0.33
  • Merged pull requests: 3
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
  • jayofelony (8)
  • aluminum-ice (3)
  • Sonys9 (3)
  • Yev-henii (3)
  • abbdulwahab86 (2)
  • liuchengzhi314159 (2)
  • renewedbullet (2)
  • the-Chain-Warden-thresh (2)
  • itsmattkc (2)
  • Urb1101 (2)
  • maple-42 (2)
  • Biohazardousrom (1)
  • Qazianwar222 (1)
  • taara67 (1)
  • linuzzx (1)
Pull Request Authors
  • DrSchottky (5)
  • yesimxev (4)
  • shawaj (2)
  • itsmattkc (2)
  • mildsunrise (2)
  • SafeCoding233 (2)
  • sfinktah (2)
  • ajlennon (1)
  • caballerofelipe (1)
  • googlebleh (1)
  • TrellixVulnTeam (1)
  • mame82 (1)
  • bakashinji (1)
  • thau0x01 (1)
  • timgates42 (1)
Top Labels
Issue Labels
Pull Request Labels

Dependencies

app/app/build.gradle maven
  • com.android.support:recyclerview-v7 23.4.0 compile
  • com.android.support:support-v4 23.4.0 compile
  • com.github.johnkil.print:print 1.3.1 compile
  • com.google.code.gson:gson 2.7 compile
  • com.nononsenseapps:filepicker 3.1.0 compile
app/build.gradle maven