ADB (Android Debug Bridge) for device interaction, app analysis, and Android penetration testing.
adb devices
adb connect 192.168.1.100:5555
adb tcpip 5555
adb -s emulator-5554 shell
adb root
adb wait-for-device
adb shell
adb shell id
adb shell pm list packages
adb shell pm list packages -3
adb shell pm path com.target.app
adb shell dumpsys package com.target.app
adb shell dumpsys activity com.target.app
adb shell am start -n com.target.app/.MainActivity
adb shell am start -a android.intent.action.VIEW -d "http://evil.com"
adb shell getprop ro.product.model
adb shell getprop ro.build.version.sdk
adb pull /data/data/com.target.app /tmp/appdata/
adb pull /sdcard/Download/file.txt /tmp/
adb push exploit.sh /data/local/tmp/
adb shell ls -la /data/data/com.target.app/
adb shell cat /data/data/com.target.app/shared_prefs/prefs.xml
adb shell cat /data/data/com.target.app/databases/app.db
adb shell pm path com.target.app && adb pull /data/app/com.target.app-1/base.apk
adb install malicious.apk
adb uninstall com.target.app
adb logcat | grep -i "com.target.app"
adb logcat -s "TAG:V" *:S
adb logcat > logcat.txt
adb shell screencap -p /sdcard/screen.png && adb pull /sdcard/screen.png