androguard - Man Page
Reverse engineering and pentesting for Android applications
Examples (TL;DR)
- Display Android app manifest:
androguard axml path/to/app.apk
- Display app metadata (version and app ID):
androguard apkid path/to/app.apk
- Decompile Java code from an app:
androguard decompile path/to/app.apk --output path/to/directory
Synopsis
androguard [Options] COMMAND [ARGS]...
Description
/usr/lib/python3.14/site-packages/androguard/core/bytecodes/apk.py:1039: SyntaxWarning: "\>" is an invalid escape sequence. Such sequences will not work in the future. Did you mean "\\>"? A raw string is also an option.
Thus specifiying :code:`{"name": "foobar"}` will match on :code:`<bla name="foobar" \>`
Androguard is a full Python tool to play with Android files.
Options
- --version
Show the version and exit.
- --verbose, --debug
Print more
- --quiet
Print less (only warnings and above)
- --silent
Print no log messages
- --help
Show this message and exit.
Commands
- analyze
Open a IPython Shell and start reverse engineering.
- apkid
Return the packageName/versionCode/versionName per APK as...
- arsc
Decode resources.arsc either directly from a given file or...
- axml
Parse the AndroidManifest.xml.
- cg
Create a call graph and export it into a graph format.
- decompile
Decompile an APK and create Control Flow Graphs.
- disassemble
Disassemble Dalvik Code with size SIZE starting from an...
- gui
Androguard GUI
- sign
Return the fingerprint(s) of all certificates inside an APK.