๐ผPIDCAT for Android Bug Bounty Logging
A focused logcat
wrapper for Android security researchers and bug bounty hunters โ helps filter logs from a specific app instead of the entire device, making vulnerability analysis faster and cleaner.
Why Use PIDCAT?
adb logcat (Default behavior)
adb devices
adb -s <device-ip:port> logcat
Captures all logs from the device: system, apps, services.
Noisy and difficult to isolate logs for one app.
pidcat (Focused behavior)
pidcat -s <device-ip:port> <package.name>
Captures logs only from a specific app using its PID (process ID).
Automatically updates PID if the app restarts.
Filters out irrelevant system logs.
Installation
1. Clone the Repository
git clone https://github.com/JakeWharton/pidcat.git
cd pidcat
2. Run Directly
On Linux/macOS:
./pidcat.py -s <device-ip:port> <package.name>
On Windows:
python pidcat.py -s <device-ip:port> <package.name>
Make It Universal on Windows
To run pidcat
from any directory:
Move
pidcat.py
to a folder likeC:\Tools\pidcat\
Add that folder to the System PATH:
Open Environment Variables
Edit the
Path
variableAdd:
C:\Tools\pidcat
(Optional) Create
pidcat.bat
in the same folder:@echo off python C:\Tools\pidcat\pidcat.py %*
Now you can run:
pidcat -s <device-ip:port> com.target.app
Example Commands
For a remote device:
pidcat -s 192.168.0.101:5555 com.target.app
For a USB device:
pidcat com.target.app
Original Repository
Last updated