diff --git a/README.md b/README.md index 72cfe0f..dbe21f8 100644 --- a/README.md +++ b/README.md @@ -67,8 +67,9 @@ The Mobile App Pentest cheat sheet was created to provide concise collection of * [ClassNameDeobfuscator](https://github.com/HamiltonianCycle/ClassNameDeobfuscator) - Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines. * [Android backup extractor](https://github.com/nelenkov/android-backup-extractor) - Utility to extract and repack Android backups created with adb backup (ICS+). Largely based on BackupManagerService.java from AOSP. Tip !! "adb backup" command can also be used for extracting application package with the following command: - * `adb backup ` - * `dd if=backup.ab bs=1 skip=24 | python -c "import zlib,sys;sys.stdout.write(zlib.decompress(sys.stdin.read()))" > backup.tar` + * `adb backup -f backup.ab` + * `adb backup -noapk -f backup_data.ab` + * `dd if=backup.ab bs=32MB skip=24 iflag=skip_bytes | python -c "import zlib,sys;sys.stdout.buffer.write(zlib.decompress(sys.stdin.buffer.read()))" > backup.tar` * [GDA(GJoy Dex Analysizer)](https://github.com/charles2gan/GDA-android-reversing-Tool) - GDA, a new Dalvik bytecode decompiler, is implemented in C++, which has the advantages of faster analysis and lower memory&disk consumption and an stronger ability to decompiling the APK, DEX, ODEX, OAT files(supports JAR, CLASS and AAR files since 3.79) #### Dynamic and Runtime Analysis