>_ shadow.red
root@shadow:~/android$ ls
[06]

Android

Alert! To view more content, click the description below a terminal command.

apktool d target_app.apk -o output_apktool
Static Analysis linux windows
androguard analyze appka.apk
Static Analysis linux
jdb -connect com.sun.jdi.SocketAttach:hostname=localhost,port=55555
Vulnerabilities linux windows
adb shell am start -a android.intent.action.VIEW "allsafe://infosecadventures/congrats"
Vulnerabilities linux windows
frida -U -f com.target.app --codeshare pcipolloni/universal-android-ssl-pinning-bypass-with-frida
Frida linux windows
adb push frida-server-17.2.16-android-arm64 /data/local/tmp/frida-server
Frida linux
adb shell am startservice infosecadventures.allsafe/.challenges.RecorderService
Vulnerabilities linux windows
adb shell am start -W -a android.intent.action.VIEW -d "insecureshop://com.insecureshop/web?url=http://192.168.1.14:9090/test.html"
Vulnerabilities linux windows
adb logcat
Logging linux windows
adb push C:\Users\user\Desktop\user.dat /sdcard/Android/data/infosecadventures.allsafe/files/
Extra linux windows
adb shell settings put global http_proxy <host-ip>:8080
Burp Suite linux windows
adb shell screencap -p /data/local/tmp/test1.png
Extra linux windows
apksigner sign --ks my-release-key.jks --in demo_malware.apk --out demo_malware2.apk
Repackaging linux windows