View color-coded, scrolling (tailed) Android device (logcat) logs directly from your phone. No USB, adb, or emailing necessary.
Set log format / level / buffer, filter logs by regex, clear log file, save to SD.
Share logs via any application that handles plain text or HTML sharing, including Gmail, Email, Pastedroid, Bluetooth, and others.
Install application Pastedroid to share logs via pastebin. Ensure HTML output is disabled in preferences as this only supports plain text logs.
aLogcat supports near full control through intents. Broadcast to start the app, save log snapshots, share logs, or make periodic saves.
Note: the periodic save feature was removed as of version 2.5. Consider the application aLogrec if you need to continuously record logs to the SD card.
With contributions by,
Debug your apps. Find error stacktraces. See what your phone is saying about you behind your back. It's all there in the system log, aka logcat!
What makes CatLog stand out over similar apps?
* Color-coded tag names
* Easy-to-read column display
* Real-time search
* Recording mode (with widget)
* Save & open from SD card
* Send logs as email or attachment
* Auto-scrolls when at the bottom of the screen (just like tail -f)
* Search autosuggestions & saved filters
* Select parts of logs
* Open-source and ad-free
An ideal tool for developers, customer support and user.
NOTE: this app doesn't send your ID to the internet so your information is safe.
For paranoid users, you can get Device ID without any network permission at :
This will disable Local IP Address and MAC address.
Google Services Framework Key ID
Subscriber ID (IMSI)
SIM Card Serial
WiFi MAC Address
Ethernet MAC Address
Bluetooth MAC Address
Bluetooth Paired MAC Address
Device Build Fingerprint
Please leave some suggestion.
Permission Explanation :
INTERNET is used to get your local IP address
BLUETOOTH is used to get your Bluetooth MAC address
READ_PHONE_STATE is used to get your IMEI, IMSI and SIM Serial
ACCESS_WIFI_STATE and ACCESS_NETWORK_STATE is used to get your MAC address
READ_GSERVICES is used to get your Google Services Framework ID
You are allowed to disable the permission using root app such as Permission Manager if you are paranoid
For user that wanted to get both SIM Serial in DUAL SIM Phone, The default SDK does not have support to handle dual SIM phones. The function will only return one number, most likely from the first active SIM card.
Facebook : https://www.facebook.com/evozi/
Beta Testing Group :
Instead of rating 1 or 2 star,please email to firstname.lastname@example.org or leave a comment so that we can fix or improve it.
A feature is built-in to test your current configuration without rebooting. The lines shown in test mode may be limited and relatively static, this does not reflect exact boot time behavior as much as it just shows you that it works and how big the text will be.
Note that LiveBoot will only show up after the data partition is mounted. If you need to enter a decryption key or pattern at boot, it will not show up until you have done so.
This app does not only require root, it requires specifically SuperSU version 2.40 or newer, due to how the boot-time code is launched. Alternatively, the app will try to function for otherwise rooted firmwares that support init.d, but this is not officially supported and it cannot be guaranteed to work.
Officially the app supports 4.3+ and newer, but really it is aimed at 5.0 firmwares. Regardless of 4.3, 4.4, or 5.0, the app may work on your device or it may not. I've gotten it to work on a bunch of my own devices on various firmwares, but not on all. Even if the test run functionality works, this does not necessarily mean it will actually work during boot. It usually does, but not always.
This does indeed also mean I cannot guarantee continued operation - even if it works for you today, it may fail your next firmware update. If that is an issue for you, then you should definitely not update to Pro.
The risk of bootloops is extremely low, but not completely non-existent. Should a bootloop occur, removing either the app's APK or /system/su.d/0000liveboot through recovery should fix the problem.
The app writes to /system, as such your firmware must allow this. There is no recovery-based install option at this time.
There's an in-app purchase to upgrade to Pro, which supports my developments, and unlocks the transparency option as well as logcat buffer and format selection.
Of course, if you have one of the paid variants of the old live logcat or live dmesg boot animations from all those years ago installed, this will also enable Pro mode.
Like some of my other apps these days, if you don't have Google Play but still managed to install the APK, this will also enable Pro mode.
Last but not least, if you simply don't want to pay for it, there's also a button to enable Pro mode.
If /system/su.d/0000liveboot.script exists (chmod 0644, not 0700 like other files in /system/su.d/ !), this script will be run instead of logcat and dmesg, and its output will be shown in white (stdout) and red (stderr).
Please see the official app thread on XDA-Developers.com here: http://forum.xda-developers.com/android/apps-games/liveboot-t2976189
Please note: From Android 4.1 onwards ANY logcat app needs root access in order to show logs.
New sliding side menus (update 1.4):
the UI has been dramatically improved and reorganized in side menus, swipe from the left side to the right to access the navigation menu and switch between the main features, swipe from the right side to the left to access the list of your saved logcats, from there open, send or delete your logs.
Introducing "Floating Logcat" (update 1.1):
a new wonderful feature powered by StandOut, it allows you to keep the logcat on top right while you're working on your device, perfect for your tests! the logcat is shown inside a window you can move, resize and even minimize, just like a desktop one.
* Read live logcat
* Pause and resume
* Record (even in background)
* Send logs via mail
* Apply filters (priority level, format, etc.)
* Search box for quick filtering
* Many options to configure the logcat
* Read the kernel's debug messages (dmesg)
* UI straightforward, the controls you need at your fingertips
* New "Per-app Logcat" feature!
* Revolutionary "Floating Logcat" feature!
* Floating window resizable even with pintch-to-zoom
- In order to start a new Floating Logcat session tap the last button on the right (bottom bar).
- In order to resize the Floating Logcat drag the bottom-right corner of the window.
Starting from version 1.3, devs can use intent actions and extras in order to launch the
logcat recorder directly from their apps:
"scd.lcex.ACTION_REC" start recording
"scd.lcex.ACTION_STOP" stop recording and service associated
"scd.lcex.EXTRA_FILTER" logcat filter (string, optional), use in conjunction with ACTION_REC
This app requires busybox and root access. If you have any questions or concerns please email us at email@example.com
★ 300+ custom boot animations
★ Convert any animated GIF to a boot animation
★ Install boot animations from your SD card
★ Root file explorer (all features included)
★ Convert boot animations to animated GIFs
★ Preview boot animations
★ Randomize your boot animations (new boot animation each reboot)
★ Resize any boot animation and change the FPS
★ Backup/Restore multiple boot animations
★ Disable your boot animation for a faster boot
Some features are only available after an in-app purchase inside the app. You can also remove ads with a small in-app purchase. Your support is much appreciated.
Android has a few places where boot animations can be installed to. It may be that your install location isn’t correct. You can select different install locations by clicking menu >> Install Location inside the app. The app also can help you find your install location by clicking menu >> Preferences >> Find locations.
Please make sure that the boot animation matches the resolution of your device or is smaller. Re-sizing the animation doesn’t always work and sometimes causes a blank screen rather than a boot animation. Some manufactures (e.g. Samsung) don’t use the standard format for boot animations. For devices that do not support the original format you will need to install a custom kernel which supports the standard boot animation. Flashing this ZIP in recovery will fix the issue on most Sumsung devices. Please make a current nandroid backup before flashing. ROM Installer may be used to flash the ZIP file.
Unfortunately, We don’t own each Android device but we have tested installing boot animations on as many devices as we can. We will continue to do our best at making the install process as smooth as possible.
Press on selected parameter to copy it to clipboard. In the same way you can copy, share, call and send message to selected number on SIM card.
This application doesn't support dual SIM.
This is adware version and requires INTERNET permission.
List of supported parameters:
- SIM card state
- SIM card serial number
- SIM card country ISO
- SIM card operator code
- SIM card operator name
- SIM IMSI
- Phone number
- Phone type
- Voice mail text ID
- Voice mail number
- Phone type
- Device IMEI
- Device MEID or ESN
- Network country ISO
- Network operator code
- Network operator name
- Network type
- Voice roaming
- Data roaming
Root is required for Android 4.1+, and recommended for all versions.
Log types supported:
* Kernel logs (dmsg)
* Last kernel log (last_kmsg, if device supports it)
* Main log (Logcat)
* Modem log
* Event logs
After taking logs, it compresses them into a single zip, and allows you to share or upload them right away - great for helping debug system issues.
You can also include notes within the zip, and append up to 10 characters to the file name.
New feature in v1.2: Grep the logs for a string. This will run the logs through grep before adding them to the zip. This is case sensitive! It will also automatically add a line to the end of the notes describing which logs and what string was used.
All the source is available at https://github.com/Tortel/SysLog
Licensed under the GNU General Public License, version 2.
Uses libsuperuser by Jorrit 'Chainfire' Jongma, available at https://github.com/Chainfire/libsuperuser and the AppCompat v21 library.
The log scrubbing utility came from the CyanogenMod bug report tool
Download this awesome app and logcat like a pro! Thread on how to read and use logcat - http://infamousdevelopment.com/forum/showthread.php?tid=53
And you can collect logcat by background process.
The feature of this application is described below.
- A long message of log will be displayed in multiple-line.
Therefore, the message of log can be checked at a glance.
- A search character string and a tag character string are recorded as a history.
later, you can refer to this history so you can input easily.
- In the background, you can collect logs.
There is a filter specification function for narrowing down collecting logs.
And there is an notification function at the time of detecting the character string specified beforehand.
- Starting background collection automatically at boot end is enabled. (Auto start on BOOT end)
- In the log detailed screen (that appears at long touch of a log line), a filter setting, cooperation with a search function, and cooperation with a mailer are possible.
- Added 'Menu Bar' which is located on the left end of a screen.
- Radio log and events log can be collected.
- Cut filter by tag is possible.
- Set of filters can be memorized.
- Narrowing is possible.
- Maximum of buffer size of reading from system is 10,000 lines.
(Note : maximum of buffer size of reading from file is 30,000 lines.)
The IMEI (International Mobile Equipment Identity) is a unique number to identify GSM, WCDMA, and iDEN mobile phones, as well as some satellite phones.
Application allows you to check details for any IMEI.
Please contact via email if app crashes on your device or you wish to report a bug. This way we can exchange details about your issues. Giving app bad review because it does not work on your device helps no one. Thanks.
- IMEI Checking:
Check whether the given IMEI (15-digit number) is valid or not by calculating the Check Digit (using Luhn algorithm) and then comparing with the Check Digit of the given IMEI. There is also the option that allow you to fetch data (Brand and Phone Model) from the popular website www.imei.info.
- IMEI Calculating:
You can enter the IMEI without the Check Digit (only 14 digits) and this app will calculate the Check Digit by using Luhn algorithm.
- IMEI Analyzing:
Breakdown the IMEI into the following parts:
• Type Allocation Code (TAC)
• Reporting Body Identifier (RBI)
• Mobile Equipment Type Identifier
• Final Assembly Code (FAC)
• Serial Number
• Check Digit
More info about IMEI:
IMEI stands for International Mobile Station Equipment Identity. The full IMEI number is 15 digits in length. You can obtain the IMEI by open the phone's dialpad and enter *#06*. Or you can see it in the label on the back of the phone, behind the battery.
Just install it and if you reach a Website with malicious code inside there will be a popup asking you wich app to launch. Just select "use as standard" an choose NoTel:URL as app and you will be fine.
Starting with Version 1.1 of the App, malicious USSD Codes are shown within a popup Window. To gain best protection there is no way to execute USSD codes. If you klick on a valid phone number within a webpage or received by barcode you are able to execute the request if your Android OS Version is >= Ice Cream Sandwich.
Below this Version there is no way to directly rout the number to the dialer, so you need to do this manually by typing the number in the dialer.
There is no need to start the App manually. If you do so, there will be an explaining Popop now.
Everything will went automatically if the app is just installed.
Detailed Information can be found on my Website:
Here you will also find urls and barcode for testing
Keywords: USSD, security
Basis des ganzen ist ein Artikel der im Print Magazin Android-User.de unter meiner Mitwirkung entstanden ist und Apps ins Visir nimmt, die mit nahezu krimineler Energie den Play-Store und andere App Stores überschwemmen. Klares und einziges Ziel dabei, BernutzerInnen mit Werbeeinblendungen und PushWerbung zu überschütten.
Die meisten der direkt in diesem Artikel angeführten Apps sind bereits aus dem Google Store entfernt worden, jedoch leben diese Apps in sekundären Appstores weiter und verbreiten sich ungewollt schnell auf unseren Smartphones.
Um Euch eine gewisse Sicherheit zumindest gegen die zur Zeit entdeckten, schädlichen Apps zu bieten, wurde die Idee zu dieser App geboren. Im Grunde eine einfache Sache, von einer vertrauenswürdigen Seite wird eine Liste mit App-Packagenamen geladen und das Smartphone wird danach dahingehend überprüft ob eine der in dieser Liste angeführten Apps installiert ist. Nicht mehr und nicht weniger.
Ihr könnt selber entscheiden, ob ihr die App dann deinstallieren wollt oder nicht.
Internet: Benötigt um die Liste der bekannten Packages herunter zu laden.
Access_Network_State: Notwendig um eine funktionierende Internetverbindung abzufragen.
Link zum Artikel bei Android-User.de:
Link zur Entstehung dieser App:
Mein Dank richtet sich an Marcel Hilzinger vom Magazin Android-User sowie an den Forensic Experten Marko Rogge. Erst diese fruchtbare Zusammenarbeit ermöglichte diese App!
Darüber hinaus demonstriert diese App wie es möglich ist, Daten aus einer App ins Internet zu übertragen, ohne die dafür notwendige Berechtigung "Vollständiger Internetzugriff" zu haben.
In dem dazugehörigen Blog wird dargelegt, welche IDs es auf den Smartphones gibt und warum man Vorsicht walten lassen sollte sie im Netz zu verteilen.
Diese App benötigt die Berechtigung "READ_PHONE_STATE" (TELEFONSTATUS UND IDENTITÄT ABRUFEN)
Dieses wird lediglich verwendet um die Daten anzuzeigen. Die ausgelesenen Daten werden weder ins Log geschrieben noch an Dritte übertragen.
Bei Fragen zu dieser App kann jederzeit ein Eintrag zu dem entsprechenden Artikel in meinem Blog gestellt werden. Dort kann ich auch gezielt und direkt antworten.
Die Idee dazu wurde auf der Android-Plattform AndroidPIT geboren.
Jannik - Die Vorlage als Windows App
Sven Manzke - Änderung bei der Edit Feld Problematik. Cooler Tipp :)
Attention, this app won't show up in normal application folder. It's visible only in the manage application list.
NoStalk will resume normal RingingMode after this. Every time "unknown Caller ID" is displayed your Android will keep silent up from now.
Update to V1.4 New German language pack and more.