All Projects → evilsocket → Androswat

evilsocket / Androswat

Licence: other
tool to inspect, dump, modify, search and inject libraries into Android processes.

AndroSwat

A tool to inspect, dump, modify, search and inject libraries into Android processes, still work in progress!

Usage

For a full set of examples, see the various actions of the Makefile.

Usage: /data/local/tmp/androswat <options> <action>

OPTIONS:

  --pid    | -p PID  : Select process by pid.
  --name   | -n NAME : Select process by name.
  --size   | -s SIZE : Set size.
  --output | -o FILE : Set output file.
  --filter | -f EXPR : Specify a filter for the memory region name.

ACTIONS:

  --help   | -H         : Show help menu.
  --show   | -S         : Show process informations.
  --search | -X HEX     : Search for the given pattern ( in hex ) in the process address space, might be used with --filter option.
  --read   | -R ADDRESS : Read SIZE bytes from address and prints them, requires -s option.
  --dump   | -D ADDRESS : Dump memory region containing a specific address to a file, requires -o option.
  --inject | -I LIBRARY : Inject the shared LIBRARY into the process.

License

Released under the BSD license.
Copyright © 2016, Simone Margaritelli [email protected]
All rights reserved.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].