Created
September 23, 2016 16:31
-
-
Save Jack2/af2a2adf50857b3686eaa5bb784af436 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dz> list | |
app.activity.forintent Find activities that can handle the given intent | |
app.activity.info Gets information about exported activities. | |
app.activity.start Start an Activity | |
app.broadcast.info Get information about broadcast receivers | |
app.broadcast.send Send broadcast using an intent | |
app.broadcast.sniff Register a broadcast receiver that can sniff | |
particular intents | |
app.package.attacksurface Get attack surface of package | |
app.package.backup Lists packages that use the backup API (returns | |
true on FLAG_ALLOW_BACKUP) | |
app.package.debuggable Find debuggable packages | |
app.package.info Get information about installed packages | |
app.package.launchintent Get launch intent of package | |
app.package.list List Packages | |
app.package.manifest Get AndroidManifest.xml of package | |
app.package.native Find Native libraries embedded in the application. | |
app.package.shareduid Look for packages with shared UIDs | |
app.provider.columns List columns in content provider | |
app.provider.delete Delete from a content provider | |
app.provider.download Download a file from a content provider that | |
supports files | |
app.provider.finduri Find referenced content URIs in a package | |
app.provider.info Get information about exported content providers | |
app.provider.insert Insert into a Content Provider | |
app.provider.query Query a content provider | |
app.provider.read Read from a content provider that supports files | |
app.provider.update Update a record in a content provider | |
app.service.info Get information about exported services | |
app.service.send Send a Message to a service, and display the reply | |
app.service.start Start Service | |
app.service.stop Stop Service | |
auxiliary.webcontentresolver | |
Start a web service interface to content | |
providers. | |
exploit.jdwp.check Open @jdwp-control and see which apps connect | |
exploit.pilfer.general.apnprovider | |
Reads APN content provider | |
exploit.pilfer.general.settingsprovider | |
Reads Settings content provider | |
information.datetime Print Date/Time | |
information.deviceinfo Get verbose device information | |
information.permissions Get a list of all permissions used by packages on | |
the device | |
scanner.activity.browsable Get all BROWSABLE activities that can be invoked | |
from the web browser | |
scanner.misc.native Find native components included in packages | |
scanner.misc.readablefiles Find world-readable files in the given folder | |
scanner.misc.secretcodes Search for secret codes that can be used from the | |
dialer | |
scanner.misc.sflagbinaries Find suid/sgid binaries in the given folder | |
(default is /system). | |
scanner.misc.writablefiles Find world-writable files in the given folder | |
scanner.provider.finduris Search for content providers that can be queried | |
from our context. | |
scanner.provider.injection Test content providers for SQL injection | |
vulnerabilities. | |
scanner.provider.sqltables Find tables accessible through SQL injection | |
vulnerabilities. | |
scanner.provider.traversal Test content providers for basic directory | |
traversal vulnerabilities. | |
shell.exec Execute a single Linux command. | |
shell.send Send an ASH shell to a remote listener. | |
shell.start Enter into an interactive Linux shell. | |
tools.file.download Download a File | |
tools.file.md5sum Get md5 Checksum of file | |
tools.file.size Get size of file | |
tools.file.upload Upload a File | |
tools.setup.busybox Install Busybox. | |
tools.setup.minimalsu Prepare 'minimal-su' binary installation on the | |
device. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment