Last updated 5 years ago
Was this helpful?
within drozer shell:
run app.package.attacksurface com.x.x.x
The command above lists:
Activities
ContentProvider
BroadcastReceiver
Services
If "is debuggable" output shows up (allows attaching a debugger to a process, using adb, and stepping through the code)
(translation needed)