help |
Show help menu with commands |
help |
list |
List all available modules |
list |
run <module> |
Run a specific module |
run app.package.list |
run app.package.list |
List installed packages |
run app.package.list |
run app.package.attacksurface -a <package> |
Show attack surface (exported components) |
run app.package.attacksurface -a com.example.app |
run app.package.info -a <package> |
Show detailed info about a package |
run app.package.info -a com.example.app |
run app.activity.info -a <package> |
List activities of an app |
run app.activity.info -a com.example.app |
run app.provider.info -a <package> |
List content providers |
run app.provider.info -a com.example.app |
run app.service.info -a <package> |
List services |
run app.service.info -a com.example.app |
run app.broadcast.info -a <package> |
List broadcast receivers |
run app.broadcast.info -a com.example.app |
run app.activity.start -a <package> -n <activity> |
Start a specific activity |
run app.activity.start -a com.example.app -n MainActivity |
run scanner.provider.injection -a <package> |
Check for SQL injection in content providers |
run scanner.provider.injection -a com.example.app |
run scanner.provider.access -a <package> |
Check for content provider access issues |
run scanner.provider.access -a com.example.app |
run scanner.misc.debuggable -a <package> |
Check if app is debuggable |
run scanner.misc.debuggable -a com.example.app |
run scanner.misc.exportedcomponents -a <package> |
Check for exported components |
run scanner.misc.exportedcomponents -a com.example.app |
run scanner.permissions.findleaks -a <package> |
Find permission leaks |
run scanner.permissions.findleaks -a com.example.app |
run exploit.reinvokeactivity -a <package> -n <activity> |
Exploit activity re-invocation |
run exploit.reinvokeactivity -a com.example.app -n MainActivity |
run exploit.debug |
Exploit debugging features |
run exploit.debug |
run exploit.serial -a <package> |
Check for serial number leaks |
run exploit.serial -a com.example.app |
run shell |
Get a shell on the device |
run shell |
run shell pm list packages |
List all packages via shell |
run shell pm list packages |
run shell dumpsys package <package> |
Get package dump information |
run shell dumpsys package com.example.app |
run file.list -p /path/ |
List files in a directory |
run file.list -p /data/data/com.example.app/ |
run file.download -p <path> |
Download file from device |
run file.download -p /data/data/com.example.app/databases/db.sqlite |
run app.package.dump -a <package> |
Dump manifest & app details |
run app.package.dump -a com.example.app |
run scanner.activity.launcher -a <package> |
Check for launcher activities |
run scanner.activity.launcher -a com.example.app |
run scanner.broadcast.receiver -a <package> |
Scan for vulnerable broadcast receivers |
run scanner.broadcast.receiver -a com.example.app |
run scanner.service.exported -a <package> |
Detect exported services |
run scanner.service.exported -a com.example.app |
run scanner.file.find -f <filename> |
Find files matching filename |
run scanner.file.find -f "*.db" |
run scanner.file.find -p <path> |
Search files recursively under path |
run scanner.file.find -p /sdcard/ |
run scanner.intent.receiver -a <package> |
Test intent receivers for possible hijacking |
run scanner.intent.receiver -a com.example.app |
run scanner.intent.sender -a <package> |
Test sending intents to apps |
run scanner.intent.sender -a com.example.app |
run exploit.activity.intent -a <package> -n <activity> |
Exploit vulnerable activity intents |
run exploit.activity.intent -a com.example.app -n MainActivity |
run exploit.provider.injection -a <package> |
Exploit content provider SQL injection |
run exploit.provider.injection -a com.example.app |
run exploit.provider.insert -a <package> |
Insert malicious data into content provider |
run exploit.provider.insert -a com.example.app |
run exploit.provider.delete -a <package> |
Delete data via content provider |
run exploit.provider.delete -a com.example.app |
run exploit.provider.update -a <package> |
Update data via content provider |
run exploit.provider.update -a com.example.app |
run exploit.provider.query -a <package> |
Query data via content provider |
run exploit.provider.query -a com.example.app |
run scanner.credentials.find |
Find exposed credentials on device |
run scanner.credentials.find |
run scanner.storage.find |
Find sensitive files in storage |
run scanner.storage.find |
run scanner.intent.injection |
Detect intent injection vulnerabilities |
run scanner.intent.injection |
run exploit.sharedprefs.read -a <package> -p <path> |
Read shared preferences file |
run exploit.sharedprefs.read -a com.example.app -p /data/data/com.example.app/shared_prefs/config.xml |
run exploit.sharedprefs.write -a <package> -p <path> -k <key> -v <value> |
Modify shared preferences |
run exploit.sharedprefs.write -a com.example.app -p /data/data/com.example.app/shared_prefs/config.xml -k isAdmin -v true |
run scanner.webview.loadurl |
Test if app loads arbitrary URLs in WebView |
run scanner.webview.loadurl |
run scanner.webview.javascript |
Detect vulnerable WebView JavaScript interfaces |
run scanner.webview.javascript |
run exploit.ssl.trustmanager |
Test SSL trust manager bypass |
run exploit.ssl.trustmanager |
run scanner.permission.injection |
Check for permission escalation opportunities |
run scanner.permission.injection |
run exploit.permission.escalation |
Try permission escalation |
run exploit.permission.escalation |
run scanner.database.leak -a <package> |
Detect database leaks |
run scanner.database.leak -a com.example.app |
run scanner.crypto.insecure -a <package> |
Detect insecure crypto usage |
run scanner.crypto.insecure -a com.example.app |
run scanner.network.manifest |
Check for insecure network configurations in manifest |
run scanner.network.manifest -a com.example.app |
run scanner.misc.nativecode |
Check for native code usage that may be vulnerable |
run scanner.misc.nativecode -a com.example.app |
run scanner.misc.screenshots |
Detect if app allows screenshots |
run scanner.misc.screenshots -a com.example.app |
run exploit.binding.command |
Try to execute system commands via exported bindings |
run exploit.binding.command -a com.example.app |