androguard - Man Page
Reverse engineering and pentesting for Android applications
Examples (TL;DR)
- Display Android app manifest:
androguard axml path/to/app.apk
- Display app metadata (version and app ID):
androguard apkid path/to/app.apk
- Decompile Java code from an app:
androguard decompile path/to/app.apk --output path/to/directory
Synopsis
androguard [Options] COMMAND [ARGS]...
Description
Androguard is a full Python tool to play with Android files.
Options
- --version
Show the version and exit.
- --verbose, ā--debug
Print more
- --quiet
Print less (only warnings and above)
- --silent
Print no log messages
- --help
Show this message and exit.
Commands
- analyze
Open a IPython Shell and start reverse engineering.
- apkid
Return the packageName/versionCode/versionName per APK as...
- arsc
Decode resources.arsc either directly from a given file or...
- axml
Parse the AndroidManifest.xml.
- cg
Create a call graph and export it into a graph format.
- decompile
Decompile an APK and create Control Flow Graphs.
- disassemble
Disassemble Dalvik Code with size SIZE starting from an...
- gui
Androguard GUI
- sign
Return the fingerprint(s) of all certificates inside an APK.
Info
April 2025 androguard 3.4.0a1