Skip to main content

Reverse Engineering : Extract contents from .img file

Reverse Engineering : Extract .img files of Android
Unyaffs is a program to extract files from a YAFFS2 file system image. Currently it can only extract images created by mkyaffs2image.

Download the source from here.

Compiling:
Extract the contents into a suitable place and run the following command
make
Usage:
unyaffs [options] <image_file_name> [<extract_directory>]
Options: -d detection of flash layout, no extraction -b spare contains bad block information -c <chunk size> set chunk size in KByte (default: autodetect, max: 16) -s <spare size> set spare size in Byte (default: autodetect, max: 512) -t list image contents -v verbose output -V print version

Source: Official github repository

Comments

Popular posts from this blog

Ubuntu: Access a usb flash drive from the terminal

    1. Find what the drive is called You'll need to know what the drive is called to mount it. To do that fire off: sudo fdisk -l You're looking for a partition that should look something like:   /dev/sdb1 . Remember what it's called. 2. Create a mount point Create a new directory in   /media   so you can mount the drive onto the filesystem: sudo mkdir /media/usb 3. Mount! sudo mount /dev/sdb1 /media/usb When you're done, just fire off: sudo umount /media/usb Source: StackOverflow

Code for Php based online Treasure Hunt

Hello guys. Some time back I organized an online treasure hunt as part of an event at my college. I thought of sharing the code with you, as you might find it useful. So, I uploaded it on github and here is the link to my repository. Download it from here , and enjoy organizing the game

Create your own custom ROM for any Android device (from XDA)

Don't want to spend time reading? Have a look at the videos here You can find a detailed guide, which keeps on updating in this thread . This guide is for the one who have little experience with Android. Also covers some good advanced topics.