Description
Luarida is Script that operates on Android. The linguistic system is Lua. The program can be written as easily as BASIC. The sample file is not installed when there is already Luarida folder in the SD card. Please Copy&Paste from my Web site or rename the folder.
The self-made program can be put on the home as a short cut.
--- Luarida Command List ---
The self-made program can be put on the home as a short cut.
--- Luarida Command List ---
(1)Input Command
editsetText(text)
editText(title[,flag])
touch([mode])
inkey([mode])
(2)System Command
system.exit()
system.expCall(classname [,data,type])
system.getAppPath()
system.getCardMnt()
system.getSec()
system.impCallActionSend(text [,type])
system.impCallActionView(text, type)
system.setrun(Luafilename)
system.setScreen(mode)
system.setSleep(off(keep)/on)
system.version()
El_Psy_Congroo()
(3)Graphic Command
canvas.drawCircle(x, y, r, color [,fill])
canvas.drawCls([colorcode])
canvas.drawLine(x0, y0, x1, y1,colorcode)
canvas.drawRect(x0, y0, x1, y1, colorcode [,fill])
canvas.getBmpSize(filename)
canvas.getColor(x, y)
canvas.getg(gx0,gy0,gx1,gy1,wx0,wy0,wx1,wy1)
canvas.getviewSize()
canvas.loadBmp(filename, x0,y0,x1,y1 [, n])
canvas.putCircle(x, y, r, colorcode [,fill])
canvas.putCls([colorcode])
canvas.putflush([x0,y0,x1,y1])
canvas.putg(gx0,gy0,gx1,gy1,wx0,wy0,wx1,wy1)
canvas.putLine(x0, y0, x1, y1, colorcode)
canvas.putRect(x0, y0, x1, y1, colorcode [,fill])
canvas.putrotg(cx,cy,angle,wx0,wy0,wx1,wy1)
canvas.putWork(xs0,ys0,xs1,ys1,xd0,yd0,xd1,yd1)
canvas.saveBmp(filename, x0,y0,x1,y1)
canvas.setMainBmp(Width, Height)
canvas.setWorkBmp(Width, Height)
canvas.workCls([colorcode])
canvas.workflush(x0,y0,x1,y1)
color(r, g, b [,Alpha])
(4)Text Command
canvas.drawText(text, x, y, size, colorcode[,backcolorcode])
canvas.drawTextBox(text, x, y, size, colorcode, wide[,backcolorcode])
canvas.drawTextCenter(text, x, y, size, colorcode[,backcolorcode])
canvas.drawTextRotate(text, x, y, angle, size, colorcode[,backcolorcode])
canvas.putText(text, x, y, size, colorcode[,backcolorcode])
canvas.putTextBox(text, x, y, size, color, wide[,backcolorcode])
canvas.putTextCenter(text, x, y, size, colorcode[,backcolorcode])
canvas.putTextRotate(text, x, y, angle, size, colorcode[,backcolorcode])
(5)Http Command
http.addHeader(headername, data)
http.addParam(post-parameter)
http.clrHeader()
http.clrParam()
http.get(url, savefilename)
http.post(url)
http.setContentType(content-type)
http.setPostFile(post-filename)
http.status()
(6)Dialog Command
dialog(title, text[,button])
item.add(text[,flag])
item.check(title)
item.clear()
item.list(title)
item.radio(title,position)
toast(text [,time])
(7)Sensor Command
sensor.getAccel()
sensor.setdevAccel(sw)
sensor.setdevMagnet(sw)
sensor.setdevOrient(sw)
sensor.getGdirection()
sensor.getMagnet()
sensor.getOrient()
(8)Sound Command
sound.beep([hz[,ms]])
sound.isPlay(soundnumber)
sound.pause(soundnumber)
sound.restart(soundnumber)
sound.setSoundFile(filename, soundnumber, flag)
sound.start(soundnumber [,loop])
sound.stop(soundnumber)
(9)ZIP Command
zip.addFile(compressed-filename [,melt-folder])
zip.exec(zipfilename)
zip.status()
(10)socket Command
sock.close(Number)
sock.connectOpen(Number,Address,Port[,TimeOut])
sock.getAddress(Number[,Local])
sock.listenOpen(Number,Port[,TimeOut])
sock.nclose(Number)
sock.nconnectOpen(Number,Address,Port[,TimeOut])
sock.ngetAddress(Number[,Local])
sock.nlistenOpen(Number,Port[,TimeOut])
sock.nrecv(Number[,TimeOut])
sock.nsend(Number,Data,Length)
sock.recv(Number[,TimeOut])
sock.send(Number,Data,Length)
(11)sprite Command
sprite.clear()
sprite.define(Number, WorkX0, WorkY0, WorkX1, WorkY1)
sprite.inArea(Number, Distance)
sprite.init()
sprite.move(Number,View,CX,CY [,WRatio,HRatio[,Angle]])
sprite.put()
sprite.touch([Number[,Number]])
The number of characters of explanations exceeded, and refer to the explanation blog for the command of the remainder, please.
http://d.hatena.ne.jp/tarosay/20110217/1297957894
You must install this app before submitting a review.
Google Play reviews now use Google+ so it's easier to see opinions from people you care about. New reviews will be publicly linked to your Google+ profile. Your name on previous reviews now appears as "A Google User".
Google Play reviews now use Google+ so it's easier to see opinions from people you care about. New reviews will be publicly linked to your Google+ profile. Your name on previous reviews now appears as "A Google User".
Write a review
My review
Review from
Reviews
Helpfulness
Newest
Rating
Helpfulness
All Versions
All Versions
Latest Version
4.1
27 total
5 18
4 2
3 2
2 1
1 4
Alex Slipenchuk
I will be very pleased if You do a little explanation in English with description of parameters and return values.
Isaias Diaz
Appears to require an SD card. Can't function with any of my text editing apps. I don't read Japanese. Website has links to non-Luridia code writen in other programming languages.
A Google User
Converted examples to English and fixed some bugs. Fun, but needs documentation.
A Google User
Rated it a 5 for concept alone, wish it had English as an option.
A Google User
5 stars for the special system command ;) I echo the comments by others that it would be awesome to have some English documentation, but I'm looking forward to playing with this more. I've been searching for a while for a simple on-device Android scripting system. Gotta go, the Organisation is on to me. El.. Psy.. Congroo.
A Google User
So sad. If only this had an option of English...
User reviews
Converted examples to English and fixed some bugs. Fun, but needs documentation.
Rated it a 5 for concept alone, wish it had English as an option.
5 stars for the special system command ;) I echo the comments by others that it would be awesome to have some English documentation, but I'm looking forward to playing with this more. I've been searching for a while for a simple on-device Android scripting system. Gotta go, the Organisation is on to me. El.. Psy.. Congroo.
What's New
v1.86Beta
It is a bug fix of swatch.getAccel().
v1.85Beta
Display mode setting command swatch.dispMode() was added to the command for SmartWatch. Moreover, canvas.putTextCenter() that had not been mounted up to now was added.
The binary of mips and x86 was bundled. However, it is not possible to confirm the operation.
v1.84Beta
Command swatch.start() and swatch.stop() for wristwatch type terminal SmartWatch that Sony sold were added.
Additional information
Updated
July 2, 2012
Size
729k
Installs
1,000 - 5,000
Current Version
1.86
Requires Android
1.6 and up
Content Rating
Everyone
Permissions
Report
Flag as inappropriate Offered By
たろサ
Developer
Similar
NoCam
NoCam disables the often-bumped camera button, fast and simple. Run NoCam to disable the camera button. Run it again to re-enable it. No rooting required. Please note that this does not disable camera itself. Additionally, due to the Android platform a persistent notification is required and will remain on your notification bar when the camera is disabled.
Like us? Check us out at www.batoct.com.
Or try our free Android games, Steaksplosion Free and the BRAND NEW game, BittyBat!
Social Engineering Kit
ddev
1
Please dont use this app for any destructive purpose, ddev will not be responsible for any kind of damage done by you. So use this app to aid your Pentest
Please read the description before downloading............
This app can do the work of set [social engineering toolkit] in backtrack. It can phish passwords and set phishing servers up,But you can not phish passwords from Sites like Paypal, you can successfully phish passwords from
common sites like -
✓ Facebook[Tested!]
✓ gmail[Tested!]
✓ rediffmail[Tested!]
✓ yahoo[Tested!]
it includes a email spoofer which works very well and a working port scanner.You can use apps like Pagekite
https://play.google.com/store/apps/detailsid=net.pagekite.app
to make the server public.
Note- 1) When any password is hacked using phishing by this app u can access the log file [where the passwords are stored] by going to the url server you have created. You can do this by clicking the notification which comes in when u create a phishing server and type in "/log.txt" so that the url looks like "localhost:port/log.txt"
2)This log file can also be accessed by going to folder named [the name which you give when creating a server in alias column] and then go to www and then open log.txt with your text editor..
Facebook page :- https://www.facebook.com/sek4android
Happy Pentest..
dSploit Scripts
jkush321
1
dSploit Scripts is an app that allows you to quickly and easily download scripts to use with dSploit's script injection.
If you don't have dSploit, grab it from http://dsploit.net
NOTE: THIS APP HAS SIMILAR REQUIREMENTS TO dSploit
- Your phone must be rooted
- You must have Gingerbread+ (2.3+)
Share your scripts!
- Download scripts created by others.
- Submit your own!
This app is open source and licensed under GPL v3.
You can browse the code here: http://github.com/jkush321/dsploitscripts
The scripts this app downloads are licensed under the MIT License.
You can browse the repository here: http://github.com/infacraft/dsploitscriptsrepo
WiFinspect [Root]
ROOT needed for most functions - FREE app without ads.
WiFinspect is a multi-tool intended for Computer Security professionals and other advanced users that wish to monitor the networks they own or have permission, i.e. the app is a security audit tool and not a hacking tool. The functions include:
* Network Information
* UPnP Device Scanner
* Host Discovery
* Network Sniffer
* Pcap Analyzer (three options)
* PCI DSS Menu
- Access Point Default Password Test (requirement 2.1.1.c)
- Access Point Security Test (requirement 4.1.1)
- Access Point Scanner (requirement 11.1)
- Internal Network Vulnerability Scanner (requirement 11.2.1)
- External Network Vulnerability Scanner (preparation for requirement 11.2.2)
* Host Information
* Port Scan
* Host Vulnerability Scan
* Traceroute
* Ping
DISCLAIMER:
This app is a student dissertation by Andreas Hadjittofis as part of his MSc in Computer Security at the University of Birmingham. The project is supervised by Dr Tom Chothia. The developers of this app cannot be held responsible for how this app is being used. The app comes with no guarantees.
NOTES:
* Based on your reports, Nmap WILL NOT WORK on devices running Android 2.1 and 2.2. You will get the "Some binaries could not be installed" error message and will be presented with the non-root mode. If you are using a newer Android version, please email me.
FUNCTIONS:
* Network Information (ROOT): Information about the connected network like MAC and IP addresses, gateway etc
* UPnP Device Scanner: Lists all UPnP devices on the network that are within the view of your device
* Host discovery (ROOT): Uses nmap to discover all devices on the network that are within the view of your device
* Network Sniffer (ROOT): Uses tcpdump to sniff on all packets that are within the view of your device. The resulting pcap files can be analyzed with Wireshark or the built-in Pcap Analyzer
* Pcap Analyzer: Uses jNetPcap to parse a pcap file. Three options: Packet Distribution, Bandwidth Distribution or Communicating Hosts analysis
* Access Point Default Password Test: Checks a pre-set list of default router passwords against your router’s control panel and notifies you if your router is using a default password
* Access Point Security Test: Displays the access points that are within the view of your device with a note whether they are secure (WPA/WPA2) or not (WEP or unlocked)
* Access Point Scanner: Displays the access points that are within the view of your device
* Internal Vulnerability Scanner (ROOT): Uses nmap to find all devices on the network that are within the view of your device. A note is given whether exploits exists for a given device based on its operating system and open ports
* External Vulnerability Scanner (ROOT): Runs Host Information, Port Scan, Host Vulnerability Scan, Traceroute, Ping or Sniffer functions on a given IP address or hostname
* Host Information (ROOT): Uses nmap to retrieve the device’s hostname, MAC address, vendor, operating system, device name and workgroup
* Port Scan (ROOT): Uses nmap to retrieve the device’s open ports. Click on a port to view the Metasploit results for the device's operating system and port
* Host Vulnerability Scanner (ROOT): Uses nmap to retrieve information about the host along with a note stating whether exploits exists for the device based on its operating system and open ports
* Traceroute (ROOT): Uses nmap to traceroute to a host
* Ping (ROOT): Uses nping to ping a host
PERMISSIONS:
* ACCESS_WIFI_STATE, CHANGE_WIFI_STATE, ACCESS_NETWORK_STATE: Used to determine if the device is connected to a Wi-Fi network and to retrieve the data displayed in Network Information function
* CHANGE_WIFI_MULTICAST_STATE: Used by the UPnP Device Scanner function
* INTERNET: Used to retrieve the device’s external IP address in Network Information function, for Metasploit search, and for the optional error reporting.
* WRITE_EXTERNAL_STORAGE: Used to store the nmap and pcap files
Intercepter-NG (ROOT)
Intercepter-NG is a multifunctional network toolkit for various types of IT specialists. It has functionality of
several famous separate tools and more over offers a good and unique alternative of Wireshark for android.
The main features are:
* network discovery with OS detection
* network traffic analysis
* passwords recovery
* files recovery
several famous separate tools and more over offers a good and unique alternative of Wireshark for android.
The main features are:
* network discovery with OS detection
* network traffic analysis
* passwords recovery
* files recovery
WARNING! If you face any problems reinstall busybox and supersu!
Runs on Android >=2.3.3 with root+busybox
Looks better on high resolution, but completely comfortable on 480x720.
PenTest Tools List
PenTest Tools is a list of android apps for penetration testing.
IT IS JUST A LIST, DON'T EXPECT ANYTHING MORE THAN THAT (sorry for all caps, but some people expect matrix meets mission impossible... and give a bad rating when their expectations are not met :) )
Please read the description...
Penetration test is used to test security of something. (if that something passes penetration test, there is a higher chance that hacker cant hack into it)
Apps are sorted with Tags.
Features:
Links to Apps on the Play Store.
Links to Apps that are NOT on the Play Store
Links to Source Code of Open Source Apps
Links to App websites.
Links to Google the name of the App or App Package.
Alternative Links to PlayStore and PlayStore Website (just in case someone likes to have those) Some apps are not on the play store, so those links wont work on the Google Play Store, but might work on other Stores (for example Aptoide).
Because there are not many pentest apps for android, there are also some useful apps for network administrators, system administrators, geeks and more :)
Tools will be as soon as i find some. if you found some app that is not there, or have any ideas on how can i make this app better, just hit me up on email.
About permissions:
This app requires permission to access the internet, because this app is actually a browser that is showing my website. (all the info about apps and app links are on that website)
Keywords: network net internet system sys linux pen penetration pentest test testing vulnerability programming hack hacking hacker intrusion security sec protection scanner analyzer anonymous protocol address ip
Am I Rooted [Root Checker]
Am I Rooted simply checks to see if your device contains both root and other important root binaries such as; SuperSU and BusyBox. It also displays information about the device currently in use, such as the current android version and the name of the device.
NOTE: Because of restrictions placed on developers by Google. This App will not root your device.
Features
-Check Root Status
-Check SuperSU & BusyBox Status
-Displays Android Device Information
-Launches Market If Important Binary is Missing
Updates(1.6)
-Fix Ad margin issue
-fix some crashing bugs
-Set Fixed orientation(Portrait)
Updates(1.7)
-Added Color to action bar
-fixed Root detection bug
If you need more information or help with rooting your device please visit
https://www.xda-developers.com
If you happen to encounter any bugs or need general help, don’t hesitate to contact me via email
Sniffer 15.4
IEEE 802.15.4 Packet Sniffer for Android devices.
Please note that external hardware (i.e., a USB Sniffer accessory/device) is required to actually capture frames. However, application features can be tried out using the test mode.
Application features:
* Capture 802.15.4 frames (by using a sniffer 15.4 accessory/device).
* Display captured frames.
* Filtering (by frame type, source address, destination address, and payload).
* Store captured frames on phone memory for future display.
* Export captured frames to PCAP format (Wireshark compatible).
* Live forwarding to an arbitrary IP address using the Zigbee Encapsulation Protocol (ZEP).
* Test mode (to try out application functionality without a sniffer 15.4 accessory/device).
To actually sniff packets you can use the following hardware:
- A Tmote Sky (a.k.a TelosB) configured as a sniffer 15.4 device; or
- A SEED-EYE board configured as a sniffer 15.4 accessory
In general, the SEED-EYE board should work on every Android device (3.1+), while the Tmote Sky works only on Android devices supporting the USB host mode (e.g., the Samsung Galaxy Nexus).
Tested Devices:
* Nexus S (Tmote sky *not* supported, you must use a SEED-EYE board)
* Galaxy Nexus
More info can be found at http://rtn.sssup.it/index.php/software/sniffer-154
Application authors:
- Daniele Alessandrelli
- Andrea Azzarà
PS: for reporting problems, bug, comments, etc, please send an e-mail to d.alessandrelli@sssup.it. Thanks!
[root] Pry-Fi
You are being watched...
Retailers, crooks, the government, and others shady individuals are tracking your movements. Even when your Wi-Fi is turned off, your phone may be broadcasting information to whomever is in range which can be used both to track repeated visits to as well as your exact movements in an area under surveillance.
It's not a big step to couple this to personal information - a retailer for example, could track your trip to the register and correlate with your payment information. Now the tracking hardware and software vendors, the store (or chain) owner, their business partners, they can now all track where you are every time you come into range of one of their systems, and fully profile who you are, what you do, your financials, and your daily patterns!
That is just one example, but there are many uses for tracking you. Make no mistake, this is happening in the real world today.
Pry-Fi
One solution is shutting off Wi-Fi completely (including the background network scanning, a setting most people don't know about), but you would lose benefits like automatically connecting to known Wi-Fi networks and improved location awareness for your apps. It also does nothing to help the situation for others.
Pry-Fi will prevent your device from announcing all the networks it knows to the outside world, but it will still allow background scanning and automatically connecting to Wi-Fi networks. While you are not connected to a Wi-Fi network, the MAC address will constantly be pseudo-randomized, following a pattern that still makes the trackers think you are a real person, but they will not encounter your MAC address again. This will slowly poison their tracking database with useless information.
When you do connect to a Wi-Fi network, unless you specify otherwise, your MAC address will also be randomized - the same MAC address will not be used the next time you connect to this or any other network.
War!
Though of course the companies involved with these trackers claim they wouldn't use the data maliciously, the possibility is there, and we all know that if something can be abused, ultimately it will be. There do not appear to be any laws against these practices yet, nor is it likely Wi-Fi will be redesigned any time soon to get rid of the information leaks.
But we can make an effort to reduce the usefulness of the tracking data for the exploiters. Pry-Fi comes with a War mode, which when enabled tries to make your Android device appear like dozens of people. Just wandering around an area under Wi-Fi location surveillance for a few minutes can ruin the tracking data for the period of your stay.
Proof of Concept
This is proof-of-concept code, and how for it will go in the future depends on interest and how well it works. It has been tested on several devices and seems to work, but it is very young still. The magic the app does to achieve its purpose is ever subject to changing Android security policies and OEM customizations, so even though it works now, there really is no saying if it will still be possible in future firmwares.
Of course you should also keep in mind that tracking can be done in many ways, and these W-Fi signals are far from the only method in use.
More...
Further details, device compatibility information, FAQ, discussion, etc is all available on XDA-Developers.com here:
http://forum.xda-developers.com/showthread.php?t=2631512
Greek WPA Finder
This app is originally intended for use inside Greece as it can recover default WPA Keys of specific router brands that are popular in Greece thus helping you test your network security.
If you are not located inside Greece you can still try your luck with this app but don't be mad if it doesn't work at all in your territory. In case you manage to connect to a network othen than yours you have to inform the owner so that he/she change password.
~ I DO NOT OWN ANY RESPONSIBILITY OF HOW THIS APP MAY BE USED ~
~ THIS IS AN AD SUPPORTED APPLICATION ~
IPView
IPView is a small application which displays the current local and public IP address of your android device and offers a widget for quick reference.
- The first box is local IP, which is the IP address that the iphone will receive from either the mobile or WIFI network.
- Then the public IP, which is the IP address that the iphone presents to the outside world. It can be the same as the cellular IP, Wifi IP or an entirely different address depending on whether your cellphone provider or WIFI network uses NAT.
- The IMEI will be available if its a phone device.
- The final box is your device's WIFI MAC address.
ezNetScan
VRSSPL
1
★ addictivetips: "ezNetScan" in top 150 Best Android apps of year 2012 ★
ezNetScan - Network Tools
ezNetScan is a handy network tool for network administrators - it scans wireless network and displays the list of all connected devices.
Various other options allow you to easily customize your network list further, including assigning device specific icon, tag name to device and additional note/comment to any device etc...
SNMP based features added which allows you to list out installed software and hardware information of network devices.
Supported Tools:
- Ping
- Service Scan
- Traceroute
- Wake on LAN
- DNS lookup
- NetBios Name
- Scan TCP Service
- Device IP Address, MAC Address and Manufacture Name
- Custom device name and icons
- Installed Software & Hardware details (It will work for SNMP enabled devices)
It also allows you to email scanned device list & command results. You can also view all your scanned network details in offline mode.
Keywords: Wifi Network, Network Scan, Network Tools, Network Admin, Network Administrator, Network Discovery, Network Inventory, Discover Host/Devices, Wifi, Wi-fi, Ping, Traceroute, Scan Service, Wake on LAN, SNMP, Installed Softwares, Hardware, Storage
WiFiGuard
GreySoft
1
[NON-ROOT] & [ROOT]
This application is created to prevent hackers' ARP spoofing attack (MITM), which used by some applications such as WifiKill, dSploit, and sniffers. It's very simple to use for Wi-Fi protection, just one button (on/off) and some settings.
It can show you information about hacker and restore ARP table (you need root).
It also works without root giving you information about attack.
Non-root features:
- gives information about attack
Root features:
- active mode(restores ARP table)
- passive mode(static ARP table)
DroidSwarm
Dr.Soong
1
Tool for network and security professionals to simulate a layer 7 HTTP denial of service attack similar to Slowloris.
Features:
* multi-threaded
* runs in the background
* can customize header fields
* XML import / export of targets
* targets are saved between sessions
Adding targets is straight forward. The only challenge may be header items. Each line in the header items represents one possible entry in the header. DroidSwarm will pick one of each randomly. So for example, if you used:
Accept: text/html
Accept-Language: en-us,en;q=0.5
Accept-Language: en
Then the header would either be:
Accept: text/html
Accept-Language: en-us,en;q=0.5
Or:
Accept: text/html
Accept-Language: en
Long clicking any target on the target list will bring up the option to Edit, Delete or Export that target.
Exporting is most useful when you want to make a lot of changes to the target. The default location for exports is the root of your SD card.
Hideman VPN
5 Hours / Week for FREE. Earn premium hours via in-app ad networks.
Easy solution for privacy and protection via VPN.
Connect to VPN in one click with Hideman VPN widget.
Pay from anywhere with in-app SMS billing.
With our VPN client you can:
Hide your IP. Nobody will know where are you from.
Encrypt internet data. Protect your Internet data with strong 256-bit encryption.
Use any site you needed without any limitations.
Remove banners and tracking systems.
Hideman application creates VPN connection to one of our servers located in 16 countries around the world. We try to add new servers as fast as we can.
VPN connection protects your privacy and increase security level.
Earn premium hours for free to unlock additional countries ( like USA or UK )
Our app uses some Android API which may be missing in your firmware ( for example most china tablets). If our app works please specify your device model and android version!
Tags: vpn, hotspot security, wifi protection, hide ip, protect ip, data encryption, change ip, watch hulu, watch netflix, unblock websites, unblock skype, anonymous surfing, privacy, remove ads
Inject Me
Fuel injector calculator.
Calculate:
* Which size you would need for a desired amount of horsepowers.
* How many horsepowers you could get from a injector.
* How much an injector would flow if you changed the pressure.
* What pressure would be needed to get an injector flow at an specified rate.
Pressure: bar or psi
Flow: cc/min or lb/h
Fuel: Gasoline/E85
Cylinders: 1-12
Type: Naturally Aspirated/Turbocharged/Supercharged
More from developer
HVC-C Data Throw
たろサ
1
オムロンのヒューマンビジョンコンポ(HVC-C)カメラが検出したデータをhttpサーバに丸ごと投げるアプリです。Webサーバ側で受信したデータを処理するAPIを用意すれば、ネットワーク経由でいろいろと遊ぶことができます。Web経由でなくても、LAN経由でローカルに繋がっているPCに送信することもできます。
また、同時にブロードキャストインテントも発行するので、AndroidアプリでBLEのプログラムを作成しなくても、このインテントを受信するだけで、認識データの処理アプリを作成できます。
また、同時にブロードキャストインテントも発行するので、AndroidアプリでBLEのプログラムを作成しなくても、このインテントを受信するだけで、認識データの処理アプリを作成できます。
説明
1.Androidの設定からBluetoothをオンにして、HVC-Cとペアリングを行います。
2.HVC-C Data Throwを起動し、Findボタンを押してHVC-Cを選択します。ビーコンが見つからない場合は、この操作を繰り返してください。
3.データを送信するURLを入力してください。例えば、
http://192.168.1.10:60001/param
のようにデータを送信したいURLを入力してください。
4.URLを入力し終わったらURL Saveボタンを押してください。
5.Startボタンを押して認識をスタートさせてください。
URLを空欄にすると、インテントのみ発行します。httpサーバへの送信は行いません。
送信データ
下記に送信されるデータの一例を示します。
?BodyDetect=0&HandDetect=0&FaceDetect=1&FEsize=146&FEx=408&FEy=267&FEconf=708&FIyaw=6&FIpitchx=6&FIroll=-3&FIconf=345&AEage=63&AEconf=250&EEgender=Female&EEconf=70&ZELR=12&ZEUD=0&BEL=287&BER=243&XEexpression=Neutral&XEscore=43&XEdegree=-57
ブロードキャストインテントの取得
intent-filterに下記のような感じで、"com.luaridaworks.extras.BODY_DETECT" と "com.luaridaworks.extras.HAND_DETECT"と"com.luaridaworks.extras.FACE_DETECT" を追加してください。
<receiver android:name=".hvccReceiver">
<intent-filter>
<action android:name="com.luaridaworks.extras.BODY_DETECT" />
<action android:name="com.luaridaworks.extras.HAND_DETECT" />
<action android:name="com.luaridaworks.extras.FACE_DETECT" />
</intent-filter>
</receiver>
BroadcastReceiverでの受信は下記のような感じで受け取ってください。
String body = (String)intent.getSerializableExtra("BODY");
String hand = (String)intent.getSerializableExtra("HAND");
String face = (String)intent.getSerializableExtra("FACE");
body,hand,face別に、上で示した例と同じ文字列を受け取ることができます。
各パラメータの意味
BodyDetect:人体検出の数
BDsize:検出サイズ
BDx:中心のX座標
BDy:中心のY座標
BDconf:信頼度0~1000
HandDetect:手検出の数
HDsize:検出サイズ
HDx:中心のX座標
HDy:中心のY座標
HDconf:信頼度0~1000
FaceDetect:顔検出の数
FEsize:検出サイズ
FEx:中心のX座標
FEy:中心のY座標
FEconf:信頼度0~1000
FIyaw:顔の左右角度
FIpitchx:顔の上下角度
FIroll:顔の傾き(回転)角度
FIconf:信頼度0~1000
AEage:年齢
AEconf:信頼度0~1000
EEgender:性別(Male, Female)
EEconf:信頼度0~1000
ZELR:視線の左右角度
ZEUD:視線の上下角度
BEL:左目のつむり具合
BER:右目のつむり具合
XEexpression:表情の判定結果(Neutral, Happiness, Supprise, Anger, Sadness)
XEscore:判定のスコア
XEdegree:ポジティブ/ネガティブ度(+100~-100)
-------------------------------------------------------------------------------------------------------------------------------------
HVC-Cの詳細はこちらから
⇒http://plus-sensing.omron.co.jp/egg-project/
※HVC-Cがなければ動作しません。
http Uploader
たろサ
1
You can through the browser program of PocketDuino, writing.
1.Please connect to the same LAN as the PC you turn on Wifi of Android, launch the browser.
2.If you put a PocketDuino, pop-up, such as a USB device field selection will come up, please answer it.
3.URL is displayed on the screen when you start this app, please go to the URL in the browser of your PC.
4.The browser of the PC, upload button and file selection menu and Upload hex file. Since come out, please upload and select the hex file to be written.
5.If Dere and Upload Successful screen of Android, we can upload.
including how to create .hex file, please visit the official site PocketDuino details.
http://www.physicaloid.com/product/pocketduino/
ちょっと+(ぷらす)
たろサ
1
[概要]
One Panasonic Hackathonで製作した「ちょっと+ (ぷらす)」というスマホアプリです。
「ちょっと+ (ぷらす)」は、飽きること無くランニングで体力作りができるようにするために、昨日の自分より「ちょっと速く走れた」ということを実感できるアプリです。毎日ちょっとずつ進歩していくというイメージです。
One Panasonic Hackathonで製作した「ちょっと+ (ぷらす)」というスマホアプリです。
「ちょっと+ (ぷらす)」は、飽きること無くランニングで体力作りができるようにするために、昨日の自分より「ちょっと速く走れた」ということを実感できるアプリです。毎日ちょっとずつ進歩していくというイメージです。
[使い方]
初めに競いたい相手データを選ぶために「コース選択」ボタンを押します。そうすると、サーバーに登録された「誰がいつどこを走ったデータか、距離は、タイムは、いくつか」という内容の一覧が表示されるので、「選択」ボタンにより選んでください。
ここで、実際のコースの地図を見たい場合は、「コース表示」ボタンを押してください。コースが表示されます。元の画面に戻るには画面をタッチします。
[ランニング開始]
選択した相手と競争を始めるには、「ランニング開始」ボタンを押してください。そうすると時間計測が始まり、競争が開始されます。画面には「タイム」と「自分の走行距離」と「相手の走行距離」と「自分のスピード」が表示されます。
相手の距離よりもたくさん走っていると、競争に勝っていることになります。「ちょっと+」は選んだ相手と競争すると同時に、現在のランニングデータを計測しています。ランニング終了後、これをサーバーにアップロードすることにより、次回の競争相手にすることができます。
[ランニング終了]
ランニングを終えるときは「メニュー」ボタンを押すと「ストップ」メニューが出てきますので、これを選んでください。タイムが止まり競争が終了します。
[ランニング記録のアップロード]
ランニングデータをアップロードするには、「メニュー」ボタンを押すと「アップロード」メニューが出てきますので、これを選んでください。アップロード画面に切り替わり、タイトルと名前の入力画面となります。タイトルと名前を入力した後、「アップロード」ボタンを押してランニングデータをアップロードしてください。
[腕時計型ランニングモニタ]
ランニングをしながらスマホを見ることは難しいので、腕時計型ランニングモニタ「リスちょ+(ぷらす)」が使えます。「リスちょ+(ぷらす)」とは、「ちょっと+」とSONY SmartWatch MN2をリンクさせて、SONY SmartWatch MN2にランニングデータと相手の情報、さらに相手のシルエットを画面に表示することができます。
※注意1: リスちょ+(ぷらす)を使用するためには、SONY SmartWatch MN2に「Bitmapキャッチャ」をインストールしておく必要が有ります。Bitmapキャッチャは下記のリンクにあります。
https://play.google.com/store/apps/details?id=com.luaridaworks.smartwatch.bitmapcatcher
※注意2: SONY SmartWatch2の場合は「Bitmapキャッチャ」を、あらかじめ動作させてから「リスちょ+(ぷらす)」を起動してください。
[リスちょ+起動]
「リスちょ+(ぷらす)」を起動するには、「メニュー」ボタンを押すと「リスちょ+起動」メニューが出てきますので、これを選んでください。
[リスちょ+停止]
「リスちょ+(ぷらす)」を停止させるには、「メニュー」ボタンを押すと「リスちょ+停止」メニューが出てきますので、これを選んでください。
[リスちょ+画面]
「リスちょ+(ぷらす)」画面について説明します。ランニングしているとき、相手よりも自分が先に走っているときには、前方に相手が見えないので、道路のみが表示されています。
そして、相手が自分の前を走っているときには、画面に相手のシルエットが表示されます。100m以内の差であれば、近くにシルエットが表示され、100m以上離されてしまうと、遠くにシルエットが表示されます。100も以上どれだけ離されても、遠くに見えるシルエットは同じで変化有りません。
FirmataMruby
たろサ
1
FirmataMruby is an application program to be able to operate GR-KURUMI by using the Firmata protocol.
The program of GR-KURUMI can be written in the ruby language. A special command of digitalWrite etc. was prepared.
It is the same as Yamruby of another application program excluding a special command for GR-KURUMI.
In addition, the heading character of the class name becomes a capital letter as for the command of Yamruby though it is almost the same as Luarida of another application program.
Yamruby has opened the source to the public to github, and refer to fvmExec.c for details, please.
Still, please feel free to contact me when you want you to add the command for GR-KURUMI though the command for GR-KURUMI is insufficient.
There is ruby program complete set of FirmataMruby about the SD card/FirmataMruby/as follows.
Moreover, there are sketch.cpp file and kurumi_sketch.bin file for GR-KURUMI/FirmataMruby/sketch/KURUMI/as follows.
Please forward this sketch.cpp and do the build by the Web compiler or forward kurumi_sketch.bin to GR-KURUMI.
If GR-KURUMI that writes kurumi_sketch.bin is connected with Android by using the FTDI substrate etc. and FirmataMruby is started, the communication is begun.
The ruby program is only executed now. Program (lchika.rb) that lights LED as a sample for KURUMI is appended.
The program of GR-KURUMI can be written in the ruby language. A special command of digitalWrite etc. was prepared.
It is the same as Yamruby of another application program excluding a special command for GR-KURUMI.
In addition, the heading character of the class name becomes a capital letter as for the command of Yamruby though it is almost the same as Luarida of another application program.
Yamruby has opened the source to the public to github, and refer to fvmExec.c for details, please.
Still, please feel free to contact me when you want you to add the command for GR-KURUMI though the command for GR-KURUMI is insufficient.
There is ruby program complete set of FirmataMruby about the SD card/FirmataMruby/as follows.
Moreover, there are sketch.cpp file and kurumi_sketch.bin file for GR-KURUMI/FirmataMruby/sketch/KURUMI/as follows.
Please forward this sketch.cpp and do the build by the Web compiler or forward kurumi_sketch.bin to GR-KURUMI.
If GR-KURUMI that writes kurumi_sketch.bin is connected with Android by using the FTDI substrate etc. and FirmataMruby is started, the communication is begun.
The ruby program is only executed now. Program (lchika.rb) that lights LED as a sample for KURUMI is appended.
Firmatamruby.rb that exists in the FirmataMruby folder of the SD card is the main menu program. This is a selection menu in the script.
If the made script file name is added to the Menu table of firmatamruby.rb, it is OK to start the script of making by oneself.
Moreover, if the short cut is pasted to the home screen, the ruby script can be started directly because the short cut of the rb file can be made.
The explanation of a command is written on the Web site displayed at the end. Please look at the explanation of ruby because the syntax is ruby language.
The program can be written only with Android by using the editor. Jota Text Editor is recommended.
===Command only for GR-KURUMI===
pinMode( pin, mode )
The mode of the pin is set.
Argument
pin: It is a pin number.
mode: It is a mode. 0:INPUT 1:OUTPUT
digitalWrite( pin, value )
It is a level in the pin is output.
Argument
pin: It is a pin number.
value: 0:LOW 1:HIGH
digitalRead( pin )
The input level of the pin is read.
Argument
pin: It is a pin number.
Return value
0:LOW, 1:HIGH
analogWrite( pin, value )
The PWM ratio is changed into the pin and the voltage is output.
Argument
pin: It is a pin number.
value: It is output PWM ratio (0-255).
analogRead( pin )
The analog voltage of the pin is read.
Argument
pin: It is a pin number.
Return value
Ten bit value: Value of ten bits (0-1023)
FirmataLua
たろサ
1
FirmataLua is an application program to be able to operate GR-KURUMI by using the Firmata protocol.
The program of GR-KURUMI can be written in the Lua language. A special command of digitalWrite etc. was prepared.
It is the same as Luarida of another application program excluding a special command for GR-KURUMI. Please refer to the explanation of the command of Luarida.
Still, please feel free to contact me when you want you to add the command for GR-KURUMI though the command for GR-KURUMI is insufficient.
There is Lua program complete set of FirmataLua about the SD card/FirmataLua/as follows.
Moreover, there are sketch.cpp file and kurumi_sketch.bin file for GR-KURUMI/FirmataLua/sketch/KURUMI/as follows.
Please forward this sketch.cpp and do the build by the Web compiler or forward kurumi_sketch.bin to GR-KURUMI.
If GR-KURUMI that writes kurumi_sketch.bin is connected with Android by using the FTDI substrate etc. and FirmataLua is started, the communication is begun.
The Lua program is only executed now. Program (lchika.lua) that lights LED as a sample for KURUMI is appended.
The program of GR-KURUMI can be written in the Lua language. A special command of digitalWrite etc. was prepared.
It is the same as Luarida of another application program excluding a special command for GR-KURUMI. Please refer to the explanation of the command of Luarida.
Still, please feel free to contact me when you want you to add the command for GR-KURUMI though the command for GR-KURUMI is insufficient.
There is Lua program complete set of FirmataLua about the SD card/FirmataLua/as follows.
Moreover, there are sketch.cpp file and kurumi_sketch.bin file for GR-KURUMI/FirmataLua/sketch/KURUMI/as follows.
Please forward this sketch.cpp and do the build by the Web compiler or forward kurumi_sketch.bin to GR-KURUMI.
If GR-KURUMI that writes kurumi_sketch.bin is connected with Android by using the FTDI substrate etc. and FirmataLua is started, the communication is begun.
The Lua program is only executed now. Program (lchika.lua) that lights LED as a sample for KURUMI is appended.
Firmatalua.lua that exists in the FirmataLua folder of the SD card is the main menu program. This is a selection menu in the script.
If the made script file name is added to the Menu table of firmatalua.lua, it is OK to start the script of making by oneself.
Moreover, if the short cut is pasted to the home screen, the Lua script can be started directly because the short cut of the lua file can be made.
The explanation of a command is written on the Web site displayed at the end. Please look at the explanation of Lua because the syntax is Lua language.
The program can be written only with Android by using the editor. Jota Text Editor is recommended.
===Command only for GR-KURUMI===
pinMode( pin, mode )
The mode of the pin is set.
Argument
pin: It is a pin number.
mode: It is a mode. 0:INPUT 1:OUTPUT
digitalWrite( pin, value )
It is a level in the pin is output.
Argument
pin: It is a pin number.
value: 0:LOW 1:HIGH
digitalRead( pin )
The input level of the pin is read.
Argument
pin: It is a pin number.
Return value
0:LOW, 1:HIGH
analogWrite( pin, value )
The PWM ratio is changed into the pin and the voltage is output.
Argument
pin: It is a pin number.
value: It is output PWM ratio (0-255).
analogRead( pin )
The analog voltage of the pin is read.
Argument
pin: It is a pin number.
Return value
Ten bit value: Value of ten bits (0-1023)
Yamruby
たろサ
1
Ya mrubyは、mrubyをAndroidに実装したものです。Ya mruby単体ではmrubyが動作するのみで、Androidを操作することはできません。Androidを操作するためには、Marida2という別アプリが必要となります。Marida2はSocketを経由してAndroidの操作ができるツールです。
Ya mubyは、このMarida2を利用してAndroidを操作すると仕組みとなっています。Ya mruby実行すると、yamruby.rb等いくつかのスクリプトがSDメモリカードの/Yamruby下にコピーされ、Yamruby.rbが実行されます。
プログラムを自作したい場合は、yamruby.rbにプログラムを書くか、Yamrubyのショートカットを画面に作り、自作rbファイルを指定してください。
コマンドの解説など詳しくは、公開しているYa mrubyのソースを見てください。基本的に、私が公開しているLuaridaに実装しているコマンド郡と同じものが使えます。
また、Androidのエディタを使ってスクリプトを書くこともできます。Jota Text Editorがおすすめです。これを使えば、rubyスクリプトの直実行も可能です。
Ya mubyは、このMarida2を利用してAndroidを操作すると仕組みとなっています。Ya mruby実行すると、yamruby.rb等いくつかのスクリプトがSDメモリカードの/Yamruby下にコピーされ、Yamruby.rbが実行されます。
プログラムを自作したい場合は、yamruby.rbにプログラムを書くか、Yamrubyのショートカットを画面に作り、自作rbファイルを指定してください。
コマンドの解説など詳しくは、公開しているYa mrubyのソースを見てください。基本的に、私が公開しているLuaridaに実装しているコマンド郡と同じものが使えます。
また、Androidのエディタを使ってスクリプトを書くこともできます。Jota Text Editorがおすすめです。これを使えば、rubyスクリプトの直実行も可能です。
ソース一式は githubに公開しています。
https://github.com/tarosay/Yamruby
Marida2
たろサ
1
Marida2 is an engine that responds to the code sent from the client with which TCP/IP is connected, and does the UI situation of Android and processing in Android.
Any operation is not done in the Marida2 unit. It operates by the command's being sent from the equipment that connects the socket by TCP/IP.
Marida2 is an upgrade version of Marida.
Any operation is not done in the Marida2 unit. It operates by the command's being sent from the equipment that connects the socket by TCP/IP.
Marida2 is an upgrade version of Marida.
If Marida2 is used, it becomes possible for the equipment that connects Micro-Bridge from the USB port to control Android directly. For instance, when the following ADB commands are issued from the equipment connected with the USB debugging turned on, it comes to be shaken to the port of the equipment by which 60081 ports of Android connected USB.
>adb forward tcp:60081 tcp:60081
It comes to be able to control Marida2 from the outside by way of USB because it enters the state that the connected equipment and Android can communicate TCP/IP by this. When this and the same thing are done with the microcomputer, it comes to be able to operate Marida2 with the microcomputer for PC because the ADB command can be used though it is easy.
Moreover, the function of Marida2 can be used from another application program in Android by connecting the socket in Android. Ya_mruby of another application program uses this and UI of Android is operated.
Please see the website for details.
SaridaSAKURA
たろサ
1
サリーダ桜(SaridaSAKURA)は、Lua言語で書くことができるAndroid上で走るスクリプトで、GR-SAKURAの制御プログラムを簡便にAndroid上で書いて動かすことを目的としています。
余り高度な処理には向いていませんが、ADKプログラム作成の敷居を下げたいと思い、作成公開しました。
スクリプトファイルはSDメモリカードの/SaridaSAKURA/以下に入っています。SaridaSAKURAを起動すると、先ずGR-SAKURAが接続されているか確認した後、SaridaSAKURA/sarida.lua スクリプトが実行されます。これがスクリプトの選択メニュとなっています。
自作のスクリプトを起動したい場合は、sarida.luaの Menuテーブルを書き換えるか、ショートカットを作成してください。コマンドの解説はWebサイトに書いています。構文はLua言語なので、Luaの解説を見てください。
また、GR-SAKURAのプログラムは、SDカード内(SaridaSAKURA/sketch_bin/)に、sketch.bin として入っています。これを取り出して、GR-SAKURAにセットしてください。
あとは、GR-SAKURAを接続するだけで、SaridaSAKURAは動きます。
プログラムはエディタを使ってAndroidだけで書くことができます。Jota Text Editorがおすすめです。
Bitmapキャッチャ
たろサ
1
SmartWatch MN2用のアプリです。LiveWare extension for SmartWatch.
本アプリ単体では、何も機能しません。
通常のAndroidアプリから画像情報などを受け取って、SmartWatchに表示するツールです。本アプリが起動していれば、SmartWatch専用のアプリを作らなくても、intentを使用してSmartWatchに画像を転送することが出来ます。
本アプリ単体では、何も機能しません。
通常のAndroidアプリから画像情報などを受け取って、SmartWatchに表示するツールです。本アプリが起動していれば、SmartWatch専用のアプリを作らなくても、intentを使用してSmartWatchに画像を転送することが出来ます。
本アプリは、起動と同時にBitmap画像とバイブレータ制御情報のBroadcastを待ち続けます。画像を送信したい場合は、下記のようなプログラムを作成してください。
ByteArrayOutputStream baos = new ByteArrayOutputStream();
bitmap.compress(CompressFormat.PNG, 100, baos);
byte[] bytebmp = baos.toByteArray();
Intent intent = new Intent("com.luaridaworks.extras.BITMAP_SEND");
intent.putExtra( "BITMAP", bytebmp);
sendBroadcast(intent);
画面より大きな画像は表示オフセット座標を指定できます。
Ver 1.1から仕様変更しました。X,Yのオフセット値を個別に設定してください。
intent.putExtra( "OFFSETX", 130 );
intent.putExtra( "OFFSETY", 60 );
ただし、「受信画像全体を表示する」にチェックを入れた場合は、画像全体が画面に収まるように表示されます。
バイブレータ情報を送信したい場合は、下記のようなプログラムを作成してください。
Intent intent = new Intent("com.luaridaworks.extras.VIBRATOR_SEND");
intent.putExtra("ONTIME", 2000 );
intent.putExtra("OFFTIME", 500 );
intent.putExtra("REPAET", 2 );
sendBroadcast(intent);
ONTIME, OFFTIME, REPEATのキーワードで数値をセットしてください。上の例では、2秒間振動し、0.5秒間停止するを2回繰り返します。
ONTIMEのみの送信も可能です。
REPAETを 0として送信するとバイブレータは停止します。
Ver 1.1より、画面タッチ及び画面スィープ結果をBroadcast送信するようにしました。
よって、各アプリでSmartWatchへのタッチアクションを取得することが出来ます。
intent-filterに、"com.luaridaworks.extras.TOUCH_SEND" と "com.luaridaworks.extras.SWIPE_SEND" を追加してください。
BroadcastReceiverでの受信は下記のような感じで受け取ってください。
int action = (Integer)intent.getSerializableExtra("ACTION");
int x = (Integer)intent.getSerializableExtra("TOUCHX");
int y = (Integer)intent.getSerializableExtra("TOUCHY");
int direction = (Integer)intent.getSerializableExtra("DIRECTION");
direction 0:UP, 1:DOWN: 2:LEFT, 3:RIGHT です。
Ver 1.2より、センサーの値を取得できるようにしました。
センサー値を取得するためには、"com.luaridaworks.extras.SENSOR_REQUEST"をBroadcast送信します。これを送信すると、Bitmapキャッチャはセンサーの値をBroadcastで返してきます。
Intent intent = new Intent("com.luaridaworks.extras.SENSOR_REQUEST");
sendBroadcast(intent);
センサーの値を受信するには、intent-filterに、"com.luaridaworks.extras.SENSOR_SEND"を追加してください。
BroadcastReceiverの受信は下記のような感じで受け取ってください。
Float x = (Float)intent.getSerializableExtra("SENSORX");
Float y = (Float)intent.getSerializableExtra("SENSORY");
Float z = (Float)intent.getSerializableExtra("SENSORZ");
Ver1.4から画面表示モードをBroadcastで設定できるようになりました。
送信手順は下記のようになります。
受信画像全体を表示する場合、
intent = new Intent(\"com.luaridaworks.extras.DISPLAY_SEND\");
intent.putExtra("WHOLE", true);
sendBroadcast(intent);
受信画像全体を表示しない場合、
intent = new Intent(\"com.luaridaworks.extras.DISPLAY_SEND\");
intent.putExtra("WHOLE", false);
sendBroadcast(intent);
画面を消す場合、
intent = new Intent(\"com.luaridaworks.extras.DISPLAY_SEND\");
intent.putExtra("SCREEN", 0);
sendBroadcast(intent);
画面を暗くする場合、
intent = new Intent(\"com.luaridaworks.extras.DISPLAY_SEND\");
intent.putExtra("SCREEN", 1);
sendBroadcast(intent);
画面を表示する場合、
intent = new Intent(\"com.luaridaworks.extras.DISPLAY_SEND\");
intent.putExtra("SCREEN", 2);
sendBroadcast(intent);
自動的にスリープする場合、
intent = new Intent(\"com.luaridaworks.extras.DISPLAY_SEND\");
intent.putExtra("SCREEN", 3);
sendBroadcast(intent);
Super-Simple Launcher
たろサ
1
It is a super-simple launcher to call the Luarida program.
Please write the program to be executed in the 'launcher.txt' under the luarida folder in the full path.
Moreover, the luarida file on the server can be specified by using http. After it downloads it from the server, it executes it.
Please put * sign on the head about the file not to be executed after it downloads it by using http.
・Example of launcher.txt
/mnt/sdcard/luarida/test/test.lua
http://192.168.1.1/sample.lua
*http://192.168.1.1/sample.png
*http://192.168.1.1/sample.ogg
/mnt/sdcard/luarida/luarida.lua
/mnt/sdcard/luarida/slauncher/slauncher.lua
Marida
たろサ
1
Marida is an engine that responds to the packet code sent from the client with which TCP/IP is connected, and does the UI situation of Android and processing in Android.
Any operation is not done in the Marida unit. It operates by the command's being sent from the equipment that connects the socket by TCP/IP.
Any operation is not done in the Marida unit. It operates by the command's being sent from the equipment that connects the socket by TCP/IP.
Please see the website for details.
