← All Cheatsheets
mobile-pentest

ADB — Android Debug Bridge

ADB (Android Debug Bridge) for device interaction, app analysis, and Android penetration testing.

136 views May 2026 lazyhackers
Connection & Setup (6)
adb devices
List connected devices/emulators
setup devices
adb connect 192.168.1.100:5555
Connect to device over network (TCP/IP mode)
connect tcp
adb tcpip 5555
Enable ADB over TCP/IP on port 5555
connect tcpip
adb -s emulator-5554 shell
Connect to specific device by ID
connect device
adb root
Restart ADB daemon as root
root
adb wait-for-device
Wait for device to come online
wait
Shell & Commands (11)
adb shell
Open interactive shell on device
shell
adb shell id
Check current user on device
shell id
adb shell pm list packages
List all installed packages
shell packages
adb shell pm list packages -3
List only third-party apps
shell packages thirdparty
adb shell pm path com.target.app
Get APK path for package
shell apk path
adb shell dumpsys package com.target.app
Full package info (perms, activities, etc)
shell dump perms
adb shell dumpsys activity com.target.app
Activity stack info
shell activity
adb shell am start -n com.target.app/.MainActivity
Launch specific app activity
shell activity launch
adb shell am start -a android.intent.action.VIEW -d "http://evil.com"
Send deeplink intent
shell intent deeplink
adb shell getprop ro.product.model
Get device model
shell device info
adb shell getprop ro.build.version.sdk
Get Android SDK version
shell version
File Operations (6)
adb pull /data/data/com.target.app /tmp/appdata/
Pull app data directory (needs root)
pull data
adb pull /sdcard/Download/file.txt /tmp/
Pull file from SD card
pull file
adb push exploit.sh /data/local/tmp/
Push file to device
push file
adb shell ls -la /data/data/com.target.app/
List app data directory
shell ls data
adb shell cat /data/data/com.target.app/shared_prefs/prefs.xml
Read shared preferences
shell sharedprefs data
adb shell cat /data/data/com.target.app/databases/app.db
Read SQLite database
shell sqlite data
APK Extraction & Logging (7)
adb shell pm path com.target.app && adb pull /data/app/com.target.app-1/base.apk
Extract installed APK from device
apk extract
adb install malicious.apk
Install APK to device
install apk
adb uninstall com.target.app
Uninstall package
uninstall
adb logcat | grep -i "com.target.app"
View app-specific logcat logs
logcat logs
adb logcat -s "TAG:V" *:S
Filter logcat by tag
logcat filter
adb logcat > logcat.txt
Save full logcat to file
logcat save
adb shell screencap -p /sdcard/screen.png && adb pull /sdcard/screen.png
Take screenshot from device
screenshot