1. 程式人生 > >Android ADB批處理指令碼

Android ADB批處理指令碼

【轉載】https://blog.csdn.net/a357339414/article/details/52072511

以下資訊全部為批處理,複製程式碼到記事本儲存為.BAT字尾。例:apk資訊檢視.bat
1.APK資訊檢視

 1 @ECHO OFF
 2  
 3 ECHO [檢視APK包資訊]
 4  
 5 ECHO -------------------------------
 6  
 7 ECHO aapt dump badging %~nx1
 8  
 9 aapt dump badging %1 > %~dp0%~n1.txt
10  
11 ECHO [暫停3秒自動關閉...]
12 13 ping -n 3 127.0.0.1>nul 14 @ECHO ON

2.APK自動安裝

 1 @ECHO OFF
 2  
 3 ECHO [安裝APK]
 4  
 5 ECHO -------------------------------
 6  
 7 ECHO [等待插入手機...]
 8  
 9 adb wait-for-device
10  
11 ECHO [安裝] %~nx1
12  
13 adb install -r %1
14  
15 ECHO [暫停5秒自動關閉...]
16  
17 ping -n 5 127.0.0.1>nul
18 19 @ECHO ON

3.讀取手機資訊儲存為檔案

 1 @ECHO OFF 
 2 ECHO [讀取手機資訊]
 3  
 4 ECHO -------------------------------
 5  
 6 adb shell cat /system/build.prop>%~dp0\phone.info
 7  
 8 FOR /F "tokens=1,2 delims==" %%a in (phone.info) do (
 9  IF %%a == ro.build.version.release SET androidOS=%%b
10  IF %%a == ro.product.model SET model=%%b
11 IF %%a == ro.product.brand SET brand=%%b 12 ) 13 del /a/f/q %~dp0\phone.info 14 ECHO. 15 ECHO.手機品牌: %brand% 16 ECHO.手機型號: %model% 17 ECHO.系統版本: Android %androidOS% 18 ECHO.------------------------------- 19 ECHO.手機品牌: %brand%>"%~dp0\Phone_%model%.txt" 20 ECHO.手機型號: %model%>>"%~dp0\Phone_%model%.txt" 21 ECHO.系統版本: Android %androidOS%>>"%~dp0\Phone_%model%.txt" 22 ECHO [暫停5秒自動關閉...] 23 ping -n 5 127.0.0.1>nul 24 @ECHO ON

4.手機截圖儲存為根目錄

 1 @ECHO OFF
 2  
 3 ECHO.[快速手機截圖]
 4  
 5 ECHO.-------------------------------
 6  
 7 ECHO.[Exce ] 手機截圖
 8  
 9 adb shell screencap -p /sdcard/screen.png
10  
11 ECHO.[Tips ] 拷貝截圖圖片至電腦
12  
13 adb pull /sdcard/screen.png "%~dp0\screen.png"
14  
15 ren screen.png "%date:~0,4%%date:~5,2%%date:~8,2%%time:~0,2%%time:~3,2%%time:~6,2%.png"
16  
17 adb shell rm /sdcard/screen.png
18  
19 ECHO [暫停2秒自動關閉...]
20  
21 ping -n 2 127.0.0.1>nul
22  
23 @ECHO ON

5.匯出Logcat日誌

 1 @ECHO OFF
 2  
 3 ECHO.[匯出logcat日誌]
 4  
 5 ECHO.-------------------------------
 6  
 7 adb logcat -d>"%date:~0,4%%date:~5,2%%date:~8,2%%time:~0,2%%time:~3,2%%time:~6,2%.log"
 8  
 9 ECHO.[暫停5秒自動關閉...]
10  
11 ping -n 5 127.0.0.1>nul
12  
13 @ECHO ON

6.android測試記憶體監控

 1 @ECHO OFF
 2  
 3 COLOR 0A
 4  
 5 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
 6  
 7 ECHO.::                                             ::
 8  
 9 ECHO.::           記憶體(RAM)監控顯示V1.0             ::
10  
11 ECHO.::                                             ::
12  
13 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
14  
15 :::::::      用於監控APP佔用記憶體             ::
16  
17 :::::::            ::
18  
19 ::::::::::::::::::::::::::::::::::::::::::::::::::::::
20  
21 SET packagename=tv.fuzegame.fuzelauncher
22    
25 :: 獲取得小時,格式為:24小時制,10點前補0
26  
27 SET c_time_hour=%time:~0,2%
28  
29 IF /i %c_time_hour% LSS 10 (
30  
31 SET c_time_hour=0%time:~1,1%
32  
33 )
34  
35 SET logfilename="%~dp0%date:~0,4%%date:~5,2%%date:~8,2%%c_time_hour%%time:~3,2%%time:~6,2%_RAM.txt"
36  
37 ECHO."記憶體資訊監控" >%logfilename%
38  
39 :Startscreencap
40  
41 adb shell procrank >>%logfilename%
42  
43 CLS
44  
45 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
46  
47 ECHO.::                                             ::
48  
49 ECHO.::            APP記憶體資訊監控顯示                 ::
50  
51 ECHO.::                                             ::
52  
53 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
54  
55 ECHO.  PID       Vss      Rss      Pss      Uss  cmdline
56  
57 FINDSTR /C:"%packagename%" %logfilename%
58  
59 ping -n 2 127.0.0.1>nul
60  
61 GOTO Startscreencap

7. Activity啟動跳轉時間監控

 1 @ECHO OFF
 2  
 3 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
 4  
 5 ECHO.::                                             ::
 6  
 7 ECHO.::     Activity啟動跳轉時間監控 V1.0           ::
 8  
 9 ECHO.::                                             ::
10  
11 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
12  
13 :::::::                          ::
14  
15 :::::::         ::
16  
17 ::::::::::::::::::::::::::::::::::::::::::::::::::::::
18  
19 ECHO.[ INFO ] 清空日誌
20  
21 adb logcat -c
22  
23 ECHO.[ INFO ] 監控開始(Ctrl+C結束)
24  
25 ECHO.[ INFO ] 儲存請拷貝輸出內容
26  
27 adb logcat -s ActivityManager|Findstr /C:": Displayed"

8.檢視RSA、APK、keystore簽名信息

  1 @ECHO OFF
  2  
  3 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
  4  
  5 ECHO.::                                             ::
  6  
  7 ECHO.::             檢視APK簽名信息                 ::
  8  
  9 ECHO.::                                             ::
 10  
 11 ECHO.:::::::::::::::::::::::::::::::::::::::::::::::::
 12  
 13  
 14 ::::::::::::::::::::::::::::::::::::::::::::::::::::::
 15  
 16 Color 0A
 17  
 18 ECHO.
 19  
 20 ECHO.[ HELP ] 可檢視RSA、APK、keystore簽名信息
 21  
 22 SET C_PATH=%~dp0
 23  
 24 REM 方法:直接將APK或RSA檔案到bat檔案上
 25  
 26 IF NOT "%1"=="" SET apkorFile=%1
 27  
 28 IF "%~x1"==".RSA" GOTO RSAFile
 29  
 30 IF "%~x1"==".rsa" GOTO RSAFile
 31  
 32 IF "%~x1"==".apk" GOTO APKFile
 33  
 34 IF "%~x1"==".APK" GOTO APKFile
 35  
 36 IF "%~x1"==".keystore" GOTO KEYSTOREFile
 37  
 38 IF "%~x1"==".KEYSTORE" GOTO KEYSTOREFile
 39  
 42 Color 0D
 43  
 44 ECHO.[ INFO ] 你是猴子派來的逗逼吧?
 45  
 46 ECHO.[ HELP ] 請將RSA或得APK或者keystore拖至Bat檔案上
 47  
 48 GOTO BATend
 49  
 52 :KEYSTOREFile
 53  
 54 DEL "%C_PATH%%~nx1.txt" 2>nul
 55  
 56 ECHO.[ INFO ] INPUT:%apkorFile%
 57  
 58 ECHO.[ INFO ] OUT: %C_PATH%%~nx1.txt
 59  
 60 ECHO.
 61  
 62 keytool -list -v -keystore %apkorFile% > "%C_PATH%%~nx1.txt"
 63  
 64 type "%C_PATH%%~nx1.txt"
 65  
 66 GOTO BATend
 67  
 70 :RSAFile
 71  
 72 DEL "%C_PATH%%~n1.RSA.txt" 2>nul
 73  
 74 ECHO.[ INFO ] INPUT:%apkorFile%
 75  
 76 ECHO.[ INFO ] OUT: %C_PATH%%~n1.RSA.txt
 77  
 78 ECHO.
 79  
 80 keytool -printcert -file %apkorFile% > "%C_PATH%%~n1.RSA.txt"
 81  
 82 type "%C_PATH%%~n1.RSA.txt"
 83  
 84 GOTO BATend
 85  
 88 :APKFile
 89  
 90 ECHO.[ INFO ] INPUT:%apkorFile%
 91  
 92 ECHO.[ INFO ] OUT: %C_PATH%%~n1.RSA.txt
 93  
 94 RD /S /Q %~n1_META-INF 2>nul
 95  
 96 ::jar tf %apkorFile%|Findstr "RSA"
 97  
 98 ::解壓簽名目錄
 99  
100 jar -xf %apkorFile% META-INF
101  
102 ::重合名資料夾
103  
104 REN META-INF %~n1_META-INF
105  
106 ::檢視簽名檔案資訊
107  
108 CD %~n1_META-INF
109  
110 FOR %%I IN (*.RSA) DO (
111     ECHO.[ INFO ] %%I
112     ECHO.
113     keytool -printcert -file %%I > "%C_PATH%%~n1.RSA.txt"
114     type "%C_PATH%%~n1.RSA.txt"
115 )
116 CD %~dp1
117 RD /S /Q %~n1_META-INF 2>nul
118 :BATend
119 ECHO.
120 ECHO.[ EXIT ] 按任意鍵關閉視窗...
121 PAUSE>nul

ps:adb logcat -d 

-d dump the log and then exit (don’t block)

附上logcat引數表:

 

 

【如有侵權,請指出刪除,多謝!】