A focused logcat wrapper for Android security researchers and bug bounty hunters — helps filter logs from a specific app instead of the entire device, making vulnerability analysis faster and cleaner.
A focused logcat wrapper for Android security researchers and bug bounty hunters — helps filter logs from a specific app instead of the entire device, making vulnerability analysis faster and cleaner.
adb devicesadb -s <device-ip:port> logcatpidcat -s <device-ip:port> <package.name>git clone https://github.com/JakeWharton/pidcat.gitcd pidcatOn Linux/macOS:
./pidcat.py -s <device-ip:port> <package.name>On Windows:
python pidcat.py -s <device-ip:port> <package.name>To run pidcat from any directory:
pidcat.py to a folder like C:\Tools\pidcat\Path variableC:\Tools\pidcatpidcat.bat in the same folder:@echo off python C:\Tools\pidcat\pidcat.py %*Now you can run:
pidcat -s <device-ip:port> com.target.appFor a remote device:
pidcat -s 192.168.0.101:5555 com.target.appFor a USB device:
pidcat com.target.app