ADB Stories
Find the app details.
#adb shell pm list packages
Find the target app from the device
#adb shell pm list packages | grep “appname”
#adb shell pm list packages | grep “crack”
Find the process ID of the app
#adb shell ps | grep “appname”
#adb shell ps | grep “crack”
Dump the memory using ADB
#adb shell am dumpheap <PID> <path_to_save>
#adb shell am dumpheap 4126 /data/local/tmp/crack.hprof
Download the saved file
#adb pull <saved_file_with_path>
#adb pull /data/local/tmp/crack.hprof
Enable and Disable the proxy
#adb shell settings put global http_proxy 127.0.0.1:8080
#adb shell settings put global http_proxy :0 // Disable the proxy
Enable Reverse Proxy
#adb reverse tcp:8080 tcp:8080
Starting an Intent from ADB
#adb shell am start -a android.intent.action.VIEW -d <data that you want to pass> <app code>