Open JhinSir opened 1 month ago
I can see that during the command execution, the output includes permissions, dangerous permissions, Activities, Exported Activities, Services, Receivers, Providers, Extracting all hardcoded secrets, and Extracting all insecure connections. But I think this is useless for my analysis. What is the purpose of this scan?
After the file is generated, the information that can be seen when it is opened is incomplete. There is only permission and provider information, which is of no value! I am not sure if it is a problem with the operation or if it is just like this.