Welcome to the latest update on scrcpy, where we dive into the exciting world of scrcpy v2.2. In this release, scrcpy introduces some noteworthy features, including camera capture capabilities and compatibility updates for Android 14.
Whether you’re a seasoned scrcpy user or new to this powerful tool for mirroring and controlling Android devices, this article will walk you through the key changes and enhancements in scrcpy v2.2.
The previous minor version introduced --audio-source=mic
to transmit the microphone instead of the device audio output.
This new version introduces --video-source=camera
to mirror the device camera instead of the device screen.
A bunch of new options have been added:
--list-cameras
--list-camera-sizes
--camera-id=
--camera-facing=
--camera-ar=
--camera-size=
--camera-fps=
--camera-high-speed
For example:
scrcpy --video-source=camera --camera-facing=front --camera-size=1920x1080
Check the camera documentation for more details.
Since the last scrcpy version, Android 14 has been released.
Unfortunately, several scrcpy features have been broken by changes in this new Android version:
--turn-screen-off
(#3927): some internal functions have been removed, without replacement that scrcpy could use (it seems it also impacts the feature in Android Studio)--lock-video-orientation
(not window --rotation
, which is independent) (#4011): some function parameters are now ignored--crop
(also #4011): some function parameters are now ignoredReported to Google/Android: issue 303565669
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…