๐ผPIDCAT for Android Bug Bounty Logging
A focused logcat wrapper for Android security researchers and bug bounty hunters โ helps filter logs from a specific app instead of the entire device, making vulnerability analysis faster and cleaner.
Why Use PIDCAT?
adb logcat (Default behavior)
adb devices
adb -s <device-ip:port> logcatCaptures all logs from the device: system, apps, services.
Noisy and difficult to isolate logs for one app.
pidcat (Focused behavior)
pidcat -s <device-ip:port> <package.name>Captures logs only from a specific app using its PID (process ID).
Automatically updates PID if the app restarts.
Filters out irrelevant system logs.
Installation
1. Clone the Repository
2. Run Directly
On Linux/macOS:
On Windows:
Make It Universal on Windows
To run pidcat from any directory:
Move
pidcat.pyto a folder likeC:\Tools\pidcat\Add that folder to the System PATH:
Open Environment Variables
Edit the
PathvariableAdd:
C:\Tools\pidcat
(Optional) Create
pidcat.batin the same folder:
Now you can run:
Example Commands
For a remote device:
For a USB device:
Original Repository
Last updated