Fork from BaiduSecurityLabs/ZjDroid.
Migrating the original project to Android Studio.
Changing the com.zjdroid.invoke
action to hey.girl
.
- Dump dex information
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_dexinfo"}'
- Dump dex classes
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_class","dexpath":"*****"}'
- Dump dex
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_dex","dexpath":"*****"}'
- Dump dex by baksmali
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"baksmali","dexpath":"*****"}'
- Dump memory
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_mem","start":1234567,"length":123}'
-
Dump stack trace information.
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_heap"}'
-
Run Lua script.
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"invoke","filepath":"****"}'