https://github.com/evilsocket/androswat
tool to inspect, dump, modify, search and inject libraries into Android processes.
https://github.com/evilsocket/androswat
Last synced: 5 months ago
JSON representation
tool to inspect, dump, modify, search and inject libraries into Android processes.
- Host: GitHub
- URL: https://github.com/evilsocket/androswat
- Owner: evilsocket
- License: other
- Created: 2016-09-14T16:32:10.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2016-09-15T12:19:12.000Z (over 9 years ago)
- Last Synced: 2025-04-04T20:36:09.651Z (10 months ago)
- Language: C++
- Homepage:
- Size: 144 KB
- Stars: 124
- Watchers: 14
- Forks: 31
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
AndroSwat
===
A tool to inspect, dump, modify, search and inject libraries into Android processes, still **work in progress**!
## Usage
For a full set of examples, see the various actions of the Makefile.
Usage: /data/local/tmp/androswat
OPTIONS:
--pid | -p PID : Select process by pid.
--name | -n NAME : Select process by name.
--size | -s SIZE : Set size.
--output | -o FILE : Set output file.
--filter | -f EXPR : Specify a filter for the memory region name.
ACTIONS:
--help | -H : Show help menu.
--show | -S : Show process informations.
--search | -X HEX : Search for the given pattern ( in hex ) in the process address space, might be used with --filter option.
--read | -R ADDRESS : Read SIZE bytes from address and prints them, requires -s option.
--dump | -D ADDRESS : Dump memory region containing a specific address to a file, requires -o option.
--inject | -I LIBRARY : Inject the shared LIBRARY into the process.
## License
Released under the BSD license.
Copyright © 2016, Simone Margaritelli
All rights reserved.