Fork from BaiduSecurityLabs/ZjDroid.
Migrating the original project to Android Studio.
Changing the com.zjdroid.invoke action to hey.girl.
- Dump dex information
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_dexinfo"}'
- Dump dex classes
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_class","dexpath":"*****"}'
- Dump dex
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_dex","dexpath":"*****"}'
- Dump dex by baksmali
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"baksmali","dexpath":"*****"}'
- Dump memory
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_mem","start":1234567,"length":123}'
-
Dump stack trace information.
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"dump_heap"}' -
Run Lua script.
adb shell am broadcast -a hey.girl --ei target [pid] --es cmd '{"action":"invoke","filepath":"****"}'