androaxml - Man Page

Reverse engineering and pentesting for Android applications

Synopsis

androaxml [Options] [FILE_]

Description

/usr/lib/python3.14/site-packages/androguard/core/bytecodes/apk.py:1039: SyntaxWarning: "\>" is an invalid escape sequence. Such sequences will not work in the future. Did you mean "\\>"? A raw string is also an option.

Thus specifiying :code:`{"name": "foobar"}` will match on :code:`<bla name="foobar" \>`

Parse the AndroidManifest.xml.

Parsing is either direct or from a given APK and prints in XML format or saves to file.

This tool can also be used to process any AXML encoded file, for example from the layout directory.

Example:

$ androguard axml AndroidManifest.xml

Options

-i,  --input FILE

AndroidManifest.xml or APK to parse (legacy option)

-o,  --output TEXT

filename to save the decoded AndroidManifest.xml to, default stdout

-r,  --resource TEXT

Resource (any binary XML file) inside the APK to parse instead of AndroidManifest.xml

--help

Show this message and exit.

Info

August 2025 androaxml 3.4.0a1