Android ADB批處理指令碼
阿新 • • 發佈:2018-11-13
【轉載】https://blog.csdn.net/a357339414/article/details/52072511
以下資訊全部為批處理,複製程式碼到記事本儲存為.BAT字尾。例:apk資訊檢視.bat
1.APK資訊檢視
1 @ECHO OFF 2 3 ECHO [檢視APK包資訊] 4 5 ECHO ------------------------------- 6 7 ECHO aapt dump badging %~nx1 8 9 aapt dump badging %1 > %~dp0%~n1.txt 10 11 ECHO [暫停3秒自動關閉...]12 13 ping -n 3 127.0.0.1>nul 14 @ECHO ON
2.APK自動安裝
1 @ECHO OFF 2 3 ECHO [安裝APK] 4 5 ECHO ------------------------------- 6 7 ECHO [等待插入手機...] 8 9 adb wait-for-device 10 11 ECHO [安裝] %~nx1 12 13 adb install -r %1 14 15 ECHO [暫停5秒自動關閉...] 16 17 ping -n 5 127.0.0.1>nul18 19 @ECHO ON
3.讀取手機資訊儲存為檔案
1 @ECHO OFF 2 ECHO [讀取手機資訊] 3 4 ECHO ------------------------------- 5 6 adb shell cat /system/build.prop>%~dp0\phone.info 7 8 FOR /F "tokens=1,2 delims==" %%a in (phone.info) do ( 9 IF %%a == ro.build.version.release SET androidOS=%%b 10 IF %%a == ro.product.model SET model=%%b11 IF %%a == ro.product.brand SET brand=%%b 12 ) 13 del /a/f/q %~dp0\phone.info 14 ECHO. 15 ECHO.手機品牌: %brand% 16 ECHO.手機型號: %model% 17 ECHO.系統版本: Android %androidOS% 18 ECHO.------------------------------- 19 ECHO.手機品牌: %brand%>"%~dp0\Phone_%model%.txt" 20 ECHO.手機型號: %model%>>"%~dp0\Phone_%model%.txt" 21 ECHO.系統版本: Android %androidOS%>>"%~dp0\Phone_%model%.txt" 22 ECHO [暫停5秒自動關閉...] 23 ping -n 5 127.0.0.1>nul 24 @ECHO ON
4.手機截圖儲存為根目錄
1 @ECHO OFF 2 3 ECHO.[快速手機截圖] 4 5 ECHO.------------------------------- 6 7 ECHO.[Exce ] 手機截圖 8 9 adb shell screencap -p /sdcard/screen.png 10 11 ECHO.[Tips ] 拷貝截圖圖片至電腦 12 13 adb pull /sdcard/screen.png "%~dp0\screen.png" 14 15 ren screen.png "%date:~0,4%%date:~5,2%%date:~8,2%%time:~0,2%%time:~3,2%%time:~6,2%.png" 16 17 adb shell rm /sdcard/screen.png 18 19 ECHO [暫停2秒自動關閉...] 20 21 ping -n 2 127.0.0.1>nul 22 23 @ECHO ON
5.匯出Logcat日誌
1 @ECHO OFF 2 3 ECHO.[匯出logcat日誌] 4 5 ECHO.------------------------------- 6 7 adb logcat -d>"%date:~0,4%%date:~5,2%%date:~8,2%%time:~0,2%%time:~3,2%%time:~6,2%.log" 8 9 ECHO.[暫停5秒自動關閉...] 10 11 ping -n 5 127.0.0.1>nul 12 13 @ECHO ON
6.android測試記憶體監控
1 @ECHO OFF 2 3 COLOR 0A 4 5 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 6 7 ECHO.:: :: 8 9 ECHO.:: 記憶體(RAM)監控顯示V1.0 :: 10 11 ECHO.:: :: 12 13 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 14 15 ::::::: 用於監控APP佔用記憶體 :: 16 17 ::::::: :: 18 19 :::::::::::::::::::::::::::::::::::::::::::::::::::::: 20 21 SET packagename=tv.fuzegame.fuzelauncher 22 25 :: 獲取得小時,格式為:24小時制,10點前補0 26 27 SET c_time_hour=%time:~0,2% 28 29 IF /i %c_time_hour% LSS 10 ( 30 31 SET c_time_hour=0%time:~1,1% 32 33 ) 34 35 SET logfilename="%~dp0%date:~0,4%%date:~5,2%%date:~8,2%%c_time_hour%%time:~3,2%%time:~6,2%_RAM.txt" 36 37 ECHO."記憶體資訊監控" >%logfilename% 38 39 :Startscreencap 40 41 adb shell procrank >>%logfilename% 42 43 CLS 44 45 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 46 47 ECHO.:: :: 48 49 ECHO.:: APP記憶體資訊監控顯示 :: 50 51 ECHO.:: :: 52 53 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 54 55 ECHO. PID Vss Rss Pss Uss cmdline 56 57 FINDSTR /C:"%packagename%" %logfilename% 58 59 ping -n 2 127.0.0.1>nul 60 61 GOTO Startscreencap
7. Activity啟動跳轉時間監控
1 @ECHO OFF 2 3 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 4 5 ECHO.:: :: 6 7 ECHO.:: Activity啟動跳轉時間監控 V1.0 :: 8 9 ECHO.:: :: 10 11 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 12 13 ::::::: :: 14 15 ::::::: :: 16 17 :::::::::::::::::::::::::::::::::::::::::::::::::::::: 18 19 ECHO.[ INFO ] 清空日誌 20 21 adb logcat -c 22 23 ECHO.[ INFO ] 監控開始(Ctrl+C結束) 24 25 ECHO.[ INFO ] 儲存請拷貝輸出內容 26 27 adb logcat -s ActivityManager|Findstr /C:": Displayed"
8.檢視RSA、APK、keystore簽名信息
1 @ECHO OFF 2 3 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 4 5 ECHO.:: :: 6 7 ECHO.:: 檢視APK簽名信息 :: 8 9 ECHO.:: :: 10 11 ECHO.::::::::::::::::::::::::::::::::::::::::::::::::: 12 13 14 :::::::::::::::::::::::::::::::::::::::::::::::::::::: 15 16 Color 0A 17 18 ECHO. 19 20 ECHO.[ HELP ] 可檢視RSA、APK、keystore簽名信息 21 22 SET C_PATH=%~dp0 23 24 REM 方法:直接將APK或RSA檔案到bat檔案上 25 26 IF NOT "%1"=="" SET apkorFile=%1 27 28 IF "%~x1"==".RSA" GOTO RSAFile 29 30 IF "%~x1"==".rsa" GOTO RSAFile 31 32 IF "%~x1"==".apk" GOTO APKFile 33 34 IF "%~x1"==".APK" GOTO APKFile 35 36 IF "%~x1"==".keystore" GOTO KEYSTOREFile 37 38 IF "%~x1"==".KEYSTORE" GOTO KEYSTOREFile 39 42 Color 0D 43 44 ECHO.[ INFO ] 你是猴子派來的逗逼吧? 45 46 ECHO.[ HELP ] 請將RSA或得APK或者keystore拖至Bat檔案上 47 48 GOTO BATend 49 52 :KEYSTOREFile 53 54 DEL "%C_PATH%%~nx1.txt" 2>nul 55 56 ECHO.[ INFO ] INPUT:%apkorFile% 57 58 ECHO.[ INFO ] OUT: %C_PATH%%~nx1.txt 59 60 ECHO. 61 62 keytool -list -v -keystore %apkorFile% > "%C_PATH%%~nx1.txt" 63 64 type "%C_PATH%%~nx1.txt" 65 66 GOTO BATend 67 70 :RSAFile 71 72 DEL "%C_PATH%%~n1.RSA.txt" 2>nul 73 74 ECHO.[ INFO ] INPUT:%apkorFile% 75 76 ECHO.[ INFO ] OUT: %C_PATH%%~n1.RSA.txt 77 78 ECHO. 79 80 keytool -printcert -file %apkorFile% > "%C_PATH%%~n1.RSA.txt" 81 82 type "%C_PATH%%~n1.RSA.txt" 83 84 GOTO BATend 85 88 :APKFile 89 90 ECHO.[ INFO ] INPUT:%apkorFile% 91 92 ECHO.[ INFO ] OUT: %C_PATH%%~n1.RSA.txt 93 94 RD /S /Q %~n1_META-INF 2>nul 95 96 ::jar tf %apkorFile%|Findstr "RSA" 97 98 ::解壓簽名目錄 99 100 jar -xf %apkorFile% META-INF 101 102 ::重合名資料夾 103 104 REN META-INF %~n1_META-INF 105 106 ::檢視簽名檔案資訊 107 108 CD %~n1_META-INF 109 110 FOR %%I IN (*.RSA) DO ( 111 ECHO.[ INFO ] %%I 112 ECHO. 113 keytool -printcert -file %%I > "%C_PATH%%~n1.RSA.txt" 114 type "%C_PATH%%~n1.RSA.txt" 115 ) 116 CD %~dp1 117 RD /S /Q %~n1_META-INF 2>nul 118 :BATend 119 ECHO. 120 ECHO.[ EXIT ] 按任意鍵關閉視窗... 121 PAUSE>nul
ps:adb logcat -d
-d dump the log and then exit (don’t block)
附上logcat引數表:
【如有侵權,請指出刪除,多謝!】