[Samsung] Respring
Restart SystemUI.apk on Samsung devices using a Secure Settings exploit.
Tyler Nijmeh · com.draco.respring
UpdatedJul 15, 2019
PublishedJul 15, 2019
Packagecom.draco.respring
MD52b5e9639fe34f835e9b1a32f03961dd4
SHA1 (signer)83:44:3B:03:7D:C8:51:D9:53:55:7E:D3:17:C3:7A:66:2D:8B:66:2E
Signed byCN=Android, OU=Android, O=Google Inc., L=Mountain View, ST=California, C=US
Malware scanTRUSTED
Contact[email protected]
What's new
- Added emergency recovery function (if system is not returned to normal within 1 second, it will reapply the reset function until the system is repaired (rarely required))
Description
Using the Secure Setting "qs_tile_column", Respring can crash SystemUI by setting it to 0. This will crash SystemUI and right after, it will set it back to its original value. This method is safe, and it will abort if the device is not supported, therefore preventing any device incompatibility errors.
This is useful for applying SystemUI overlays, or just refreshing the UI cache.
This is useful for applying SystemUI overlays, or just refreshing the UI cache.
Required features
- Touchscreen android.hardware.touchscreen
Permissions (1)
[Samsung] Respring requests the following Android permissions:
- Write Secure Settings android.permission.WRITE_SECURE_SETTINGS