SecretCodes is a Bash-based utility for enumerating android_secret_code dialer codes across system and pre-installed applications on Android devices. It leverages ADB (Android Debug Bridge) to extract hidden secret codes safely and efficiently from a non-rooted device.
Whether you’re a security researcher, forensic analyst, or Android enthusiast, this script collects secret codes in a structured format, including text, CSV, or JSON exports.
Before you begin, ensure you have:
- ADB installed on your system:
sudo apt install adb -y- USB debugging enabled on the target Android device.
- Exactly one authorized device connected to avoid ambiguous results.
- Proper authorization to access the device.
Check that your device is detected and authorized:
adb devicesExample output:
List of devices attached
RZ8N1234XYZ device
- Clone the repository:
git clone https://github.com/DouglasFreshHabian/SecretCodes.git
cd SecretCodes- Make the script executable:
chmod +x secretCodes.sh- Execute the script (default text output):
./secretCodes.shThe script supports multiple output modes:
| Option | Description |
|---|---|
--csv |
Export results to CSV for spreadsheet use |
--json |
Export results to JSON for programmatic use |
--quiet |
Suppress console output, write directly to output file |
--help |
Display help menu |
Examples:
./secretCodes.sh --csv
./secretCodes.sh --json --quietOutput files are automatically timestamped and include device metadata:
Secret_Codes_2025-12-31_12-00-00.csv
Secret_Codes_2025-12-31_12-00-00.json
Secret_Codes_2025-12-31_12-00-00.txt
- Enumerates system packages (
pm list packages -s) via ADB. - Extracts android_secret_code authorities from package manifests (
pm dump). - Filters and deduplicates codes for clean output.
- Supports structured CSV and JSON export alongside text for human readability.
- Adds a colorized console output for easy readability (unless
--quietis used).
- Bash utility for automated enumeration of hidden Android secret codes.
- Works on non-rooted devices.
- Output formats: text, CSV, JSON.
- Supports QUIET mode for silent operation.
⚠️ Some secret codes may not be accessible on modern devices due to OEM restrictions or Android version limitations.
- Use SecretCodes only on devices you own or have explicit permission to analyze.
- Collected secret codes may contain sensitive operations or hidden features.
- Unauthorized use could violate device manufacturer policies or local laws.
Contributions, bug reports, or feature suggestions are welcome. Open an issue or submit a pull request to improve the tool for the community.
If SecretCodes™ helps your research or forensic work, consider supporting ongoing development:

