• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer navigation

The Geek Diary

  • OS
    • Linux
    • CentOS/RHEL
    • Solaris
    • Oracle Linux
    • VCS
  • Interview Questions
  • Database
    • oracle
    • oracle 12c
    • ASM
    • mysql
    • MariaDB
  • DevOps
    • Docker
    • Shell Scripting
  • Big Data
    • Hadoop
    • Cloudera
    • Hortonworks HDP

Android

dexdump: Display information about Android DEX files

by admin

“dexdump” is a command-line tool that provides detailed information about Android DEX files. DEX files, short for Dalvik Executable files, are the compiled bytecode format used by the Android operating system. The primary purpose of “dexdump” is to assist developers and researchers in analyzing and understanding the contents of DEX files. It enables them to […]

Filed Under: Android

bundletool: Command-line tool to manipulate Android Application Bundles

by admin

The “bundletool” is a command-line tool developed by Google for manipulating Android Application Bundles (AAB). An Android Application Bundle is a publishing format introduced by Google that contains all the resources and code needed to build an Android app. The “bundletool” command-line tool provides various functionalities for working with Android Application Bundles. Some of its […]

Filed Under: Android

apktool – Reverse engineer APK files (Command Examples)

by admin

“apktool” is a powerful and versatile tool used for reverse engineering Android application packages (APK files). It enables developers and security researchers to analyze and understand the inner workings of Android apps by decompiling and extracting their resources, source code, and other components. With its comprehensive set of features, “apktool” facilitates the examination, modification, and […]

Filed Under: Android, Linux

androguard – Reverse engineering tool for Android applications. Written in Python

by admin

“Androguard” is a powerful reverse engineering tool specifically designed for analyzing Android applications. It is written in Python, making it easily accessible and customizable for developers and security researchers. The primary purpose of Androguard is to dissect, analyze, and understand the inner workings of Android applications. Reverse engineering involves deconstructing an application to extract information […]

Filed Under: Android

adb – Android Debug Bridge: communicate with an Android emulator instance or connected Android devices

by admin

ADB (Android Debug Bridge) is a versatile command-line tool that allows you to communicate with an Android emulator or connected Android devices from your computer. It plays a crucial role in Android development, testing, and troubleshooting processes. Here are some key points to elaborate on: Communication: ADB facilitates communication between your computer and an Android […]

Filed Under: Android

adb shell – Android Debug Bridge Shell: Run remote shell commands on an Android emulator instance or connected Android devices

by admin

The “adb shell” command is a fundamental feature of the Android Debug Bridge (ADB) tool that enables developers to run remote shell commands on an Android emulator instance or a connected Android device. It provides a direct interface to execute commands and interact with the operating system of the target device. Here are some key […]

Filed Under: Android

adb reverse – Android Debug Bridge Reverse: reverse socket connections from an Android emulator instance or connected Android devices

by admin

The “adb reverse” command is a feature of the Android Debug Bridge (ADB) tool that allows you to reverse socket connections from an Android emulator instance or a connected Android device. This command enables developers to access services running on the Android device or emulator from the development machine, simplifying the testing and debugging process. […]

Filed Under: Android

adb-logcat – Dump a log of system messages (Command Examples)

by admin

The “adb logcat” command is a feature of the Android Debug Bridge (ADB) tool that allows you to dump a log of system messages from an Android device or emulator. The logcat provides a detailed record of various system events, errors, and debugging information, helping developers analyze and troubleshoot issues in their Android applications. Here […]

Filed Under: Android

adb install – Android Debug Bridge Install: Push packages to an Android emulator instance or connected Android devices

by admin

The “adb install” command is a part of the Android Debug Bridge (ADB) tool, which is used for communication between a computer and an Android device or emulator. Specifically, the “adb install” command allows you to push packages (typically Android application files with the .apk extension) to an Android emulator instance or a connected Android […]

Filed Under: Android

aapt – Android Asset Packaging Tool (Command Examples)

by admin

The “aapt” command stands for the “Android Asset Packaging Tool.” It is a command-line tool provided by the Android SDK (Software Development Kit) that is used to compile and package an Android application’s resources. In the context of Android development, resources refer to various assets used by an app, such as images, XML layout files, […]

Filed Under: Android

Primary Sidebar

Recent Posts

  • diffstat: Create a histogram from the output of the diff command
  • diffoscope: Compare files, archives, and directories
  • diff-pdf: Tool for comparing two PDFs
  • dict: Command line dictionary using the DICT protocol

© 2023 · The Geek Diary

  • Archives
  • Contact Us
  • Copyright