AndroSwat
A tool to inspect, dump, modify, search and inject libraries into Android processes, still work in progress!
Usage
For a full set of examples, see the various actions of the Makefile.
Usage: /data/local/tmp/androswat <options> <action>
OPTIONS:
--pid | -p PID : Select process by pid.
--name | -n NAME : Select process by name.
--size | -s SIZE : Set size.
--output | -o FILE : Set output file.
--filter | -f EXPR : Specify a filter for the memory region name.
ACTIONS:
--help | -H : Show help menu.
--show | -S : Show process informations.
--search | -X HEX : Search for the given pattern ( in hex ) in the process address space, might be used with --filter option.
--read | -R ADDRESS : Read SIZE bytes from address and prints them, requires -s option.
--dump | -D ADDRESS : Dump memory region containing a specific address to a file, requires -o option.
--inject | -I LIBRARY : Inject the shared LIBRARY into the process.
License
Released under the BSD license.
Copyright Š 2016, Simone Margaritelli [email protected]
All rights reserved.