๐Ÿ˜ผPIDCAT for Android Bug Bounty Logging

A focused logcat wrapper for Android security researchers and bug bounty hunters โ€” helps filter logs from a specific app instead of the entire device, making vulnerability analysis faster and cleaner.


Why Use PIDCAT?

adb logcat (Default behavior)

adb devices
adb -s <device-ip:port> logcat
  • Captures all logs from the device: system, apps, services.

  • Noisy and difficult to isolate logs for one app.

pidcat (Focused behavior)

pidcat -s <device-ip:port> <package.name>
  • Captures logs only from a specific app using its PID (process ID).

  • Automatically updates PID if the app restarts.

  • Filters out irrelevant system logs.


Installation

1. Clone the Repository

2. Run Directly

On Linux/macOS:

On Windows:


Make It Universal on Windows

To run pidcat from any directory:

  1. Move pidcat.py to a folder like C:\Tools\pidcat\

  2. Add that folder to the System PATH:

    • Open Environment Variables

    • Edit the Path variable

    • Add: C:\Tools\pidcat

  3. (Optional) Create pidcat.bat in the same folder:

Now you can run:


Example Commands

  • For a remote device:

  • For a USB device:


Original Repository

https://github.com/JakeWharton/pidcat

Last updated