androaxml - Man Page

Reverse engineering and pentesting for Android applications

Synopsis

androaxml [Options] [FILE_]

Description

Parse the AndroidManifest.xml.

Parsing is either direct or from a given APK and prints in XML format or saves to file.

This tool can also be used to process any AXML encoded file, for example from the layout directory.

Example:

$ androguard axml AndroidManifest.xml

Options

-i,  --input FILE

AndroidManifest.xml or APK to parse (legacy option)

-o,  --output TEXT

filename to save the decoded AndroidManifest.xml to, default stdout

-r,  --resource TEXT

Resource (any binary XML file) inside the APK to parse instead of AndroidManifest.xml

--help

Show this message and exit.

Info

April 2025 androaxml 3.4.0a1