apt install apktoolapktool d {apk_file}apt install jadx, pass it the apk fileandroid.name in the code
adbramdisk.img path within ~/Library/Android/sdk/ (e.g. system-images/android-34/...)adb devices to see devices runningadb shell ps | grep -i {app packaging name} to see running processesadb logcat --pid={process id from above} to see log messages for applicationtelnet 127.0.0.1 {adb_device_id_like_5554}auth {value in ~/.emulator_console_auth_token} and then can interact with the devicesensor status and sensor set acceleration 0:9.8:0pipx install drozeradb install drozer-agent.apk
adb forward tcp:31415 tcp:31415drozer console connectInstallation
pip3 install frida-toolsadb
adb push {server_file} /data/local/tmpadb shell then su (must already be rooted)chmod +x /data/local/tmp/{server_file} and ./data/local/tmp/{server_file}frida-ps -UDumping process memory with fridump
python3 fridump.py -U <APP NAME> -s to dump memory to ./dump
strings on all dumps, saving all strings to ./dump/strings.txtfridump.py and replacing create_script with:
script = session.create_script("""'use strict';
rpc.exports = {
enumerateRanges: function (prot) {
return Process.enumerateRanges(prot);
},
readMemory: function (address, size) {
return ptr(address).readByteArray(size);
}
};
""")
Modifying Process Memory
frida -U -n "{process_name}"
frida-ps -U-l {js_file}.jsMemory.writeU32({address}, {newValue})frida -U -n "{process_name}" -l memscan.jsmsNew({value})msNewRange({value1}, {value2})msRefine({eq/lt/gt}, {value})msFreeze(index)