KomSr3ll
Jan 18, 2021

ADB Stories

Find the app details.

#adb shell pm list packages

Find the target app from the device

#adb shell pm list packages | grep “appname”

#adb shell pm list packages | grep “crack”

Find the process ID of the app

#adb shell ps | grep “appname”

#adb shell ps | grep “crack”

Dump the memory using ADB

#adb shell am dumpheap <PID> <path_to_save>

#adb shell am dumpheap 4126 /data/local/tmp/crack.hprof

Download the saved file

#adb pull <saved_file_with_path>

#adb pull /data/local/tmp/crack.hprof

Enable and Disable the proxy

#adb shell settings put global http_proxy 127.0.0.1:8080

#adb shell settings put global http_proxy :0 // Disable the proxy

Enable Reverse Proxy

#adb reverse tcp:8080 tcp:8080

Starting an Intent from ADB

#adb shell am start -a android.intent.action.VIEW -d <data that you want to pass> <app code>

KomSr3ll
KomSr3ll

Written by KomSr3ll

Error 404!! Buy me a coffee here: buymeacoffee.com/komsr3ll. PS: I'm sharing my learnings with you.

No responses yet