๐ผPIDCAT for Android Bug Bounty Logging
A focused logcat wrapper for Android security researchers and bug bounty hunters โ helps filter logs from a specific app instead of the entire device, making vulnerability analysis faster and cleaner.
Why Use PIDCAT?
adb logcat (Default behavior)
adb devices
adb -s <device-ip:port> logcatCaptures all logs from the device: system, apps, services.
Noisy and difficult to isolate logs for one app.
pidcat (Focused behavior)
pidcat -s <device-ip:port> <package.name>Captures logs only from a specific app using its PID (process ID).
Automatically updates PID if the app restarts.
Filters out irrelevant system logs.
Installation
1. Clone the Repository
git clone https://github.com/JakeWharton/pidcat.git
cd pidcat2. Run Directly
On Linux/macOS:
./pidcat.py -s <device-ip:port> <package.name>On Windows:
python pidcat.py -s <device-ip:port> <package.name>Make It Universal on Windows
To run pidcat from any directory:
Move
pidcat.pyto a folder likeC:\Tools\pidcat\Add that folder to the System PATH:
Open Environment Variables
Edit the
PathvariableAdd:
C:\Tools\pidcat
(Optional) Create
pidcat.batin the same folder:@echo off python C:\Tools\pidcat\pidcat.py %*
Now you can run:
pidcat -s <device-ip:port> com.target.appExample Commands
For a remote device:
pidcat -s 192.168.0.101:5555 com.target.appFor a USB device:
pidcat com.target.app
Original Repository
Last updated