apk reverse

decompile apk

apktool d a.apk


mv a.apk a.zip
unzip a.zip
d2j-dex2jar classes.dex
jd-gui #<--open classes-dex2jar.jar




sudo apt install anbox adb
sudo modprobe binder_linux
sudo modprobe ashmem_linux
sudo wget https://build.anbox.io/android-images/2018/07/19/android_amd64.img -O /var/lib/anbox/android.img
#start sessionmanager
anbox launch --package=org.anbox.appmgr --component=org.anbox.appmgr.AppViewActivity
adb devices
adb install a.apk

android backups

.ab files: –> https://android.stackexchange.com/a/73052

$ adb backup -f net.mx17.overridedns.ab -noapk net.mx17.overridedns
Now unlock your device and confirm the backup operation.
extract the compressed data
$ dd if=net.mx17.overridedns.ab bs=1 skip=24 > compressed-data
1285+0 records in
1285+0 records out
1285 bytes (1,3 kB) copied, 0,00745877 s, 172 kB/s
decompress the compressed data
$ printf "\x1f\x8b\x08\x00\x00\x00\x00\x00" \
    | cat - compressed-data | gunzip -c > decompressed-data.tar
gzip: stdin: unexpected end of file
"untar" the tar file
$ tar xf decompressed-data.tar

android x86

mitm proxy

cd ~/.mitmproxy/
hashed_name=`openssl x509 -inform PEM -subject_hash_old -in mitmproxy-ca-cert.cer | head -1` && cp mitmproxy-ca-cert.cer $hashed_name.0
adb devices                                                                                                                                                                             
* daemon not running; starting now at tcp:5037
* daemon started successfully
List of devices attached
6c0597d8        unauthorized

adb devices                                                                                                                                                                       List of devices attached
6c0597d8        device

copy c8750f0d.0 to /system/etc/security/cacerts/ with explorer
  • pcapdroid –>
  • ./mitmweb --mode socks5 --listen-port 8050


adb push <file> <target-dir>
adb install <apk-file>
adb devices
adb connect <ip>
adb shell
adb uninstall <app name.apk>
adb logcat
adb pull /sdcard/<file name><file location path>
adb reboot
#set proxy
adb shell settings put global http_proxy <ip>:<port>

#unset proxy
adb shell settings put global http_proxy :0 
c8750f0d.0  frida-android-repinning_sa-1.js  frida-server-15.1.17-android-x86     mitmproxy-7.0.4-linux
f50b0909.0  frida-script.js                  frida-server-15.1.17-android-x86_64
adb root                                                 
adb push frida-server-15.1.17-android-x86 /data/local/tmp/frida-server
adb shell "chmod 755 /data/local/tmp/frida-server"
adb shell "/data/local/tmp/frida-server --listen &"

adb shell settings put global http_proxy
~/.local/bin/frida -U -f net.ajcloud.wansviewplus -l frida-script.js --no-pause