dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,859
- Solutions
- 4
- Reputation
- 27
- Reaction score
- 45,545
- Points
- 1,813
- Credits
- 55,080
7 Years of Service
56%
Display and control your Android device
scrcpy (v3.1)
This link is hidden for visitors. Please Log in or register now.
pronounced "screen copy"
This application mirrors Android devices (video and audio) connected via USB or
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
It focuses on:
- lightness: native, displays only the device screen
- performance: 30~120fps, depending on the device
- quality: 1920×1080 or above
- low latency:
This link is hidden for visitors. Please Log in or register now.
- low startup time: ~1 second to display the first image
- non-intrusiveness: nothing is left installed on the Android device
- user benefits: no account, no ads, no internet required
- freedom: free and open source software
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
- mirroring with
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
- physical
This link is hidden for visitors. Please Log in or register now.This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
- and more…
Tutorial Here:
Control Android with Kali Linux
Warning
Disclaimer: The content shared in this forum is for educational and informational purposes only. We promote ethical cybersecurity practices and do not support or condone any illegal activities. Any misuse of the information provided is solely the responsibility of the user. Always ensure compliance with local laws and ethical guidelines when conducting security research.
Download
- dEEpEst
- Replies: 0
- Forum: General Hacking
Last edited: