androaxml - Man Page
Reverse engineering and pentesting for Android applications
Synopsis
androaxml [Options] [FILE_]
Description
/usr/lib/python3.14/site-packages/androguard/core/bytecodes/apk.py:1039: SyntaxWarning: "\>" is an invalid escape sequence. Such sequences will not work in the future. Did you mean "\\>"? A raw string is also an option.
Thus specifiying :code:`{"name": "foobar"}` will match on :code:`<bla name="foobar" \>`
Parse the AndroidManifest.xml.
Parsing is either direct or from a given APK and prints in XML format or saves to file.
This tool can also be used to process any AXML encoded file, for example from the layout directory.
Example:
$ androguard axml AndroidManifest.xml
Options
- -i, --input FILE
AndroidManifest.xml or APK to parse (legacy option)
- -o, --output TEXT
filename to save the decoded AndroidManifest.xml to, default stdout
- -r, --resource TEXT
Resource (any binary XML file) inside the APK to parse instead of AndroidManifest.xml
- --help
Show this message and exit.