Bugjaeger tries to give you the expert tools used by Android developers for better control and deep understanding of your Android device internals.
If you're an Android power user, developer, geek, or hacker, this app might be something for you.
How to use
1.) Enable developer options and USB debugging on your target device (https://developer.android.com/studio/debug/dev-options)
2.) Connect the device where you've installed this app to the target device via USB OTG cable
3.) Allow the app to access USB device and make sure the target device authorizes USB debugging
I case you also have the free version installed, I suggest to uninstall the free version, so there are no conflicts when accessing ADB USB devices
Please report technical issues or your new feature requests directly to my email address - firstname.lastname@example.org
This app can be used by developers to debug Android apps or by Android enthusiast to learn more about the internals of their devices.
You connect your target device through USB OTG cable or through wifi and you'll be able to play around with the device.
This tool offers some features similar to adb(Android Debug Bridge) and Android Device Monitor, but instead of running on your development machine, it runs directly on your Android phone.
Main features include
- executing custom shell scripts
- remote interactive shell
- creating and restoring backups, inspecting and extracting content of backup files
- reading, filtering, and exporting device logs
- capturing screenshots
- performing various commands for controlling your device (rebooting, going to bootloader, rotating screen, killing running apps)
- uninstalling and installing packages, checking various details about installed apps
- monitoring the processes, showing additional information related to processes, killing processes
- showing various details about the device's Android version, cpu, abi, display
- showing battery details (like e.g., temperature, health, technology, voltage,..)
- file management - pushing and pulling files from device, browsing the file system
- If you want to connect the target device through USB cable, your phone has to support USB host
- The target phone must enable USB debugging in Developer options and authorise the development device
This app uses the normal/official way of communicating with Android devices which requires authorisation.
The app does not bypass Android's security mechanisms and it does not use any Android system vulnerabilities or anything similar!
This also means the app won't be able to perform some privileged tasks on non-rooted devices (e.g. removing system apps, killing system processes,...).
Additionally, this is not a rooting app.