Skip to content

Bin4ry/deejayeye-modder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

deejayeye-modder

This is for advanced users, if you are looking into easy drone modding look at our partner website drone-hacks https://drone-hacks.com

Find the chinese version here:

LICENSE

DBAD-LICENSE: https://www.dbad-license.org/

UNLOCK

UDONTSAY

BRINGIT

This software is free to use, feel free to modify.

Only thing I ask for is to link this git as a start point of your own modifications.

Disclaimer:

I am not responsible for any damage done! Use your brain and all will be fine!

Also I will not include any apk to this git! You have to do everything yourself, if you cannot you should not play with stuff like this!

Mavic Air

We will not support the Mavic Air anytime soon. Noone of us is planning of buying the drone.

Donations

Due to request I added some donation methods, thank you very much for donating so the hacking of this stuff can go on :)

PayPal: [email protected]

BTC: 1QKMFRMkauTXii8MGrYvt3C6m5dTjym9NG

BCH: 12UnxVsA1Q9AHpy384spTVDNJVnudPZWXP

ETH: 0x8fc3461e971790498eb43b4608ba58f7e4300c98

Thank you emails :) -> [email protected]

Want to contribute or learn some stuff?

Join our Mattermost (this is where the magic happens): UPDATED LINK (30.11.2021) https://dji-rev.com

What is the latest version to work?

Latest version that works with these patches is app version 4.1.22. Since the original version is encrypted, you need a special decrypted version. This version can be found online. The filename is "4.1.22_V3028592-nosecneo" ONLY THIS VERSION is supported, you will not find this version on apk-mirror or such! For further information, come to slack and join #android-apk-patching

App version >= 4.1.4

Starting from 4.1.4 the CC check dialog is gone and will not come back (still the fcc patch code is present and working)

FCC

If you get a message about different region etc. etc after using the FCC patch: YOU HAVE TO CLICK OK ONCE AFTER THE PATCH IS APPLIED! This will reboot the AC with the new Region (FCC REGION). Once you use and unmodded app the same popup will come again and if you click OK now it will reboot and apply the limits of your current region again!

HowTo:

Linux:

  1. Make sure you have dialog, bspatch, dos2unix xmlstarlet java and libwebp installed. a)sudo apt-get install dialog bspatch dos2unix xmlstarlet openjdk-8-jre b) i)mkdir temp ii)wget https://storage.googleapis.com/downloads.webmproject.org/releases/webp/libwebp-1.0.0.tar.gz -O temp/libwebp-1.0.0.tar.gz iii)tar xvzf libwebp-1.0.0.tar.gz iv)cd libwebp-1.0.0 v)./configure vi)make vii)sudo make install

  2. Download needed tools manually or run the script provided.

    a) Download apktool, rename it to apktool.jar and save it to tools folder: https://bitbucket.org/iBotPeaches/apktool/downloads/

    b) Download sign.jar from https://github.com/appium/sign/raw/master/dist/sign.jar and put it in tools folder

  3. Get the apk to modify (ver. 4.1.3), try 'Raccoon, the apk downloader' (Linux/OSX/Windows), you can get it here: http://raccoon.onyxbits.de/, or try a mirror such as http://www.apkmirror.com/

  4. RunMe.sh If a Settings.xml file is present, data are read from and used to automatically field the corresponding settings. For more information, please read Settings.xml file content.

macOS:

  1. Install the required dependencies with Brew:

    brew install dialog dos2unix imagemagick webp gnu-getopt gnu-sed xmlstarlet wget brew link --force gnu-getopt ./download_tools.sh

  2. Get the apk to modify (ver. 4.1.3), try 'Raccoon, the apk downloader' (Linux/OSX/Windows), you can get it here: http://raccoon.onyxbits.de/, or try a mirror such as http://www.apkmirror.com/

  3. RunMe.sh If a Settings.xml file is present, data are read from and used to automatically field the corresponding settings. For more information, please read Settings.xml file content.

Windows

(For Windows there is currently no support of the new features [app-cloning etc.] like in the Ng version on Linux)

  1. You may need to install Java Development Kit, you can get it here: http://www.oracle.com/technetwork/java/javase/downloads/index.html
  2. Run the download_tools.bat file
  3. Get the apk (look in the patches folder for supported versions), check above for link
  4. RunMe.bat (as Administrator)

URLs patching

Two new tools designed for that purpose instead of the old patching way search_urls.sh and url_patcher.sh Both take one argument which is the name of the decompiled directory.

Search_urls.sh generate some config files in MODDED_APK_OUT/urls/subdir_with_name_of_workdir The file fogged_urls.txt and unfogged_urls.txt can (must) be edited, changing the first column to enable / disable further application by the second script: the default files DO NOT DISABLE any url in order not to break the app. The files must be edited to goOffline (or partially offline)

url_patcher.sh applies the patching prepared in MODDED_APK_OUT/urls/subdir_with_name_of_workdir

THIS DOES NOT MEAN that the app can not reach servers by other path... take care...

NFZ : 2018 April 24th update

After a while and discussions on Slack with active "NFZ" workers, it was decided to make a public release for the NFZ unlocking patches. There was already an app patch that removed some upgrade warnings. It has been merged with the new parts and renamed removeNFZ_ApplicationPart As the name tells, this is the Application part only and you will still need to make some firmware modifications (much simpler than module mixing) that will also be released soon. Stay tuned on Slack channel! Without the firmware part, the NFZ is still active onboard the aircraft and will actually prevent flying in a DJI NFZ.

This release has been made possible thanks to hard work of alexstalker, Len, quad808, d95gas, jezzab, bin4ry and others.

There was a previous "no NFZ unlocking policy" in the modder with following reasons:

Reasons:
  1. I don't want people flying in NFZ
  2. It did not work consistently

If you are authorised to fly in a RED NFZ and have problems with them activating your account, you should fallback to the firmware parameter change. This was never meant to help people fly in RED NFZ!

The first argument still stands: we do not want people to fly in a civil or military aviation's official NFZ that may exist anywere in the world. Doing this is illegal, dumb and dangerous.

However, we changed our minds because:

  1. The DJI unlocking system is a PITA to use and requires an account login, with all potential data leaks involved with this.
  2. DJI NFZ db is far from perfectly match actual NFZ areas. Some real areas are missing, some DJI db areas should have no official reality. UAV pilots should educate themselves and seek for the actual official data sources rather than relying on a third party system that is not approved by any aviation authorities.
  3. Having a geofence system is not a legal requirement onboard UAV's, at least we haven't heard about such rules yet... by the way, many other brands do not have this kind of "feature".
  4. Some people (pros) need to fly in NFZ and have official clearance to do so. Sometimes, DJI has no reason to even know about these situations...
  5. Now the patches work!

#DeejayeyeHackingClub information repos aka "The OG's" (Original Gangsters)

http://dji.retroroms.info/ - "Wiki"

https://github.com/fvantienen/dji_rev - This repository contains tools for reverse engineering DJI product firmware images.

https://github.com/Bin4ry/deejayeye-modder - APK "tweaks" for settings & "mods" for additional / altered functionality

https://github.com/hdnes/pyduml - Assistant-less firmware pushes and DUMLHacks referred to as DUMBHerring when used with "fireworks.tar" from RedHerring. DJI silently changes Assistant? Great... we will just stop using it.

https://github.com/MAVProxyUser/P0VsRedHerring - RedHerring, aka "July 4th Independence Day exploit", "FTPD directory transversal 0day", etc. (Requires Assistant). We all needed a public root exploit... why not burn some 0day?

https://github.com/MAVProxyUser/dji_system.bin - Current Archive of dji_system.bin files that compose firmware updates referenced by MD5 sum. These can be used to upgrade and downgrade, and root your I2, P4, Mavic, Spark, Goggles, and Mavic RC to your hearts content. (Use with pyduml or DUMLDore)

https://github.com/MAVProxyUser/firm_cache - Extracted contents of dji_system.bin, in the future will be used to mix and match pieces of firmware for custom upgrade files. This repo was previously private... it is now open.

https://github.com/MAVProxyUser/DUMLrub - Ruby port of PyDUML, and firmware cherry picking tool. Allows rolling of custom firmware images.

https://github.com/jezzab/DUMLdore - Even windows users need some love, so DUMLDore was created to help archive, and flash dji_system.bin files on windows platforms.

https://github.com/MAVProxyUser/DJI_ftpd_aes_unscramble - DJI has modified the GPL Busybox ftpd on Mavic, Spark, & Inspire 2 to include AES scrambling of downloaded files... this tool will reverse the scrambling.

https://github.com/darksimpson/jdjitools - Java DJI Tools, a collection of various tools/snippets tied in one CLI shell-like application.