(Click me to see it.)
hoardy-adb
is a tool that can help you to:
- list contents of Android Backup files (
backup.ab
,*.ab
and*.adb
files produced byadb backup
,bmgr
, and similar tools), - strip encryption and/or compression from Android Backup files (so that you could re-compress them with something better for long-term storage),
- (re-)encrypt and/or (re-)compress Android Backup files (to change encryption passphrase, or to compress with higher levels of compression compared to that Android OS uses by default),
- convert Android Backup files into TAR files (which you can then unpack with standard
tar
), - convert TAR files into Android Backup files (though, see the documentation for
hoardy-adb wrap
below explaining why you should be careful about doing that), - split Android Backup files into smaller by-app backups (each of which you can then give to
adb restore
to restore that one app, or just file-level de-duplicate them between different backups), - merge those small by-app backups back into full-system backups like those produced by
adb backup
, - and other similar things.
In other words, hoardy-adb
is a Swiss-army-knife-like utility for manipulating Android Backup files.
Basically, this is a simpler pure Python implementation (only requires setuptools
and cryptography
modules) of android-backup-extractor and the parts of android-backup-toolkit and android-backup-processor that I use myself.
hoardy-adb
will run on Linux and all other POSIX-compatible operating systems Python supports.
The author also expects it will work fine on Windows, even though it was not tested there (do report an Issue if it does not).
hoardy-adb
was previously knows as abarms
.
Read the parts highlighted in bold in the following subsection.
Did you know that your Android OS device already has an awesome built-in full-system phone-to-PC backup and PC-to-phone restore tool that does not require root access?
adb
utility of Android Platform Tools has adb backup
subcommand that, in principle, can do basically everything you could possibly want there.
Internally this is implemented via Android OS setuid root binary named bu
--- which you can run manually via adb shell bu help
--- that simply backs up every app on the device one by one and streams the resulting .ab
file --- which is a wrapped PAX-formatted TAR file (see "EXTENDED DESCRIPTION" section in man 1 pax
) --- to stdout. adb backup
subcommand is just a simple wrapper around it.
But then Android Platform Tools bundle gives no tools to manipulate those backup files!
So, if you make a full-system backup with adb backup
, and then want to restore a single app out of 100+ you have installed on your device, you need third-party tools now.
This is kind of embarrassing, to be honest.
A tool to manipulate backup files should have been a standard utility in Android Platform Tools since Android version 0.1 or something.
(Seriously, are you not embarrassed? I'm embarrassed for the state of humanity thinking about how the most popular OS on the planet gives no widely accessible local backup and restore tools on par with what every user of 1970s-era UNIX mainframe had out of the box. I'm not asking for automatic opportunistic incremental quantum-safely encrypted full-system replication to cooperative nearby devices in a local mesh-network here!)
Well, technically speaking, Android OS also has automatic scheduled non-interactive backup service bmgr
--- which can be controlled via Android settings menu and adb shell bmgr help
, that does per-app backups and restores.
Internally, bmgr
service also generates .ab
files and then either uploads them to Google --- which is the default and the only option available through the settings menu --- or stores them locally under /data/data/com.android.localtransport/files/
--- which requires root to access.
On old Android versions you could ask bmgr
to make a backup to an SD card directly from the settings menu, but Google removed that functionality to force users to use Cloud-based backups.
So, basically, according to Google (and Samsung, which ship with their own bmgr
-like service in parallel with bmgr
), to restore to a previous state of an app, or to migrate between phones you now apparently have to upload all your data to their servers in plain-text for their convenient data-mining and selling of your data to interested third parties.
Google even went as far as to hide adb backup
subcommand from their official Android documentation: compare the old manual for adb
with the current one, Control+F for "backup".
This resulted into every Android vendor now making their own vendor-specific phone-to-phone migration utilities, and a whole ecosystem of commercial apps that do what adb backup
already does, but worse.
This also resulted in usefulness of adb backup
itself being reduced because in Android version 6 Google made automatic daily file-based backups that get uploaded to Google the default when you attach your phone to your Google account.
So, most apps started opting out of those backups for privacy and security reasons -- which also started opting them out of being included in adb backup
output, since bmgr
and bu
share most of the infrastructure.
Some of those apps now implement their own in-app backup buttons hidden away in the settings menu somewhere, but most do not.
Yes, this is stupid, see this discussion on StackOverflow. See also old Android developer docs that explained this fairly clearly here and here.
(You can also force an app to be included in adb backup
by rebuilding its APK to enable android:allowBackup
attribute in the manifest and installing the result manually, see this for more info.
But this will only work for newly installed apps as you will have to re-sign the resulting APK with your own private key and Android forbids app updates that change the signing key.)
But, hopefully, eventually, some alternative firmware developer will fix the above bug and allow adb backup
to backup all apps regardless of android:allowBackup
manifest setting, as it should.
Still, adb backup
works fine for a lot of apps and, hopefully, will eventually get back to working as well as it did before Android version 6 in the future.
Meanwhile, android-backup-toolkit allows you to split full-system dumps produced by adb backup
into per-app backups that can then be restored with adb restore
.
The problem is that, while I'm thankful that android-backup-toolkit exists, I find it really annoying to use: it is a bundle of pre-compiled Java apps, binaries, and shell scripts that manages to work somehow, but modifying anything there is basically impossible as building all of those things from sources is an adventure I failed to complete, and then you need to install the gigantic Java VM and libraries to run it all.
So, as it currently stands, to have per-app backups of your Android device you have to either:
- root your device;
- give up your privacy by uploading your backups to other people's computers (aka "the cloud"); or
- repack all you APKs with
android:allowBackup = true
and either run older Android firmware that can do backup to an SD card or runadb backup
from your PC, and then extract per-app backups from its output with third-party tools like android-backup-toolkit (yes, this is not ideal, but it works, and does not need root).
So, one day I was looking at all of this.
I couldn't root or change the firmware on a phone I wanted to keep backed up, but I could follow the last option and get most of what I wanted with almost no effort.
Except figuring out how to run android-backup-toolkit
to do the very last step of this took me quite a while.
And so I thought, "Hmm, this seems overly complicated, something as simple as splitting and merging TAR files with some additional headers should be doable with a simple Python program."
So I made one.
It turned out to be a bit less simple than I though it would be, mostly because Python's tarfile
module was not designed for this, so I had to make my own, and PAX-formatted TAR files are kind of ugly to parse, but it works now, so, eh.
Hopefully, hoardy-adb
existing will inspire more app and alternative firmware developers to support adb backup
properly and so personal computing devices of late 2020s will finally reach feature parity with 1970s-era Tape ARchiving (TAR) backup technology.
(You can backup any UNIX box to an external HDD with tar -cvvf /media/external/backup.tar --one-file-system /
.
Yes, it will actually work.)
-
Install
Python 3
:- On a Windows system: Download Python installer from the official website, run it, set
Add python.exe to PATH
checkbox, thenInstall
(the default options are fine). - On a conventional POSIX system like most GNU/Linux distros and MacOS X: Install
python3
via your package manager. Realistically, it probably is installed already.
- On a Windows system: Download Python installer from the official website, run it, set
-
Install Android Platform Tools:
- Either from there,
- or via your package manager.
-
On a Windows system:
Open
cmd.exe
(pressWindows+R
, entercmd.exe
, pressEnter
), install this withpython -m pip install hoardy-adb
and run as
python -m hoardy_adb --help
-
On a POSIX system or on a Windows system with Python's
/Scripts
added toPATH
:Open a terminal/
cmd.exe
, install this withpip install hoardy-adb
and run as
hoardy-adb --help
-
Alternatively, for light development (without development tools, for those see
nix-shell
below):Open a terminal/
cmd.exe
,cd
into this directory, then install withpython -m pip install -e . # or pip install -e .
and run as:
python -m hoardy_adb --help # or hoardy-adb --help
-
Alternatively, on a system with Nix package manager
nix-env -i -f ./default.nix hoardy-adb --help
-
Alternatively, to replicate my development environment:
nix-shell ./default.nix --arg developer true
Before you make a full backup of your Android phone (or other device) you need to
-
enable "Developer Mode" and turn on "USB Debugging" in "Developer Options" (see Android Docs for instructions);
-
on Windows, you might need to run
adb start-server
incmd
, unless you configured it to start automatically; -
on Linux, you usually need to run
sudo adb kill-server sudo adb start-server
unless, you added special UDev rules for your phone.
Additionally, depending your device, you might also need to enable "Stay awake" in "Developer Options", otherwise long enough backups might get interrupted in the middle by your device going to sleep. Personally, I find having it enabled kind of annoying, so I recommend trying to do everything below with it disabled first, and enable it only if your backups get truncated.
To do the backup, you need to
-
unlock your phone and connect it to your PC via a USB cable (in that order, otherwise USB Debugging will be disabled),
-
confirm that the PC is allowed to do USB Debugging in the popup on the phone, then
-
run
adb backup -apk -obb -all -system -keyvalue
on your PC (see below if that does not work),
-
unlock your phone again, and
-
press "Back up my data" button at the bottom of your screen.
Now you need to wait awhile for adb
to finish.
The result will be saved in backup.ab
file.
If you want to backup to an explicitly named file, e.g. to note the date of the backup, run
adb backup -f backup_20240101.ab -apk -obb -all -system -keyvalue
If adb backup
does not work, you can invoke bu
via adb shell
instead:
adb shell 'bu backup -apk -obb -all -system -keyvalue' > backup_20240101.ab
You can view contents of the backup via
hoardy-adb ls backup_20240101.ab
and split it into per-app backups via
hoardy-adb split backup_20240101.ab
which will produce a bunch of files named hoardy_adb_split_<filename>_<num>_<appname>.ab
(e.g. hoardy_adb_split_backup_20240101_020_org.fdroid.fdroid.ab
).
A single per-app file can be fed back to adb restore
to restore that singe app, e.g.
adb restore hoardy_adb_split_backup_20240101_020_org.fdroid.fdroid.ab
Or, alternatively, if adb restore
does not work, invoke bu
via adb shell
:
adb shell 'bu restore' < hoardy_adb_split_backup_20240101_020_org.fdroid.fdroid.ab
You can also rebuild the original full-backup from parts via
hoardy-adb merge hoardy_adb_split_backup_20240101_*.ab backup_20240101.rebuilt.ab
to check that it produces exactly the same backup file
# strip encryption and compression from the original
hoardy-adb strip backup_20240101.ab backup_20240101.stripped.ab
# compare to the stipped original and the rebuilt file
diff backup_20240101.stripped.ab backup_20240101.rebuilt.ab || echo differ
You should use one of these instead:
-
App Manager from F-Droid, which is an Android app with a nice UI: just select the apps you want, and press "Save APK";
-
BARIA from F-Droid, which is an Android app with much less nice UI: long-press all the apps you want to save, and then press the "Copy" button on the top of the screen to back them up;
-
simply
adb shell pm path <pkg>
and thenadb pull <resulting_path>
, which you can then restore viaadb install
; -
getapk
andrestoreapks
scripts from Adebar, which automate that for you.
..., then instead of all of the above, you can backup all of your stuff with
-
Neo Backup on F-Droid and/or Syncthing-Fork on F-Droid;
the latter of which is useful even without root access, though it won't be helping you backup your apps in that case;
-
simply
adb pull
and/oradb shell "su -c 'tar ...'" > backup.tar
from the device; -
or use
root_appbackup.sh
androot_apprestore.sh
scripts from Adebar, which automate that for you; -
running the following
# check if bmgr is enabled adb shell bmgr enabled # list bmgr transports adb shell bmgr list transports # localtransport should be there, enable it adb shell bmgr transport com.android.localtransport/.LocalTransport # enable bmgr adb shell bmgr enable true # do a full backup now adb shell bmgr fullbackup
and then take per-app backup files from
/data/data/com.android.localtransport/files/
;
android-backup-toolkit
and friends:
-
android-backup-extractor is a Java app that can decrypt and decompress Android Backup archives and convert them into TAR.
-
android-backup-toolkit builds on top of
android-backup-extractor
and provides a way to split full-system backup ADB files into per-app pieces. -
android-backup-processor is an older version of
android-backup-toolkit
.
Others:
-
A gist by AnatomicJC, among other useful
adb
hacks, shows how to do per-app backups with pureadb shell
andadb backup
calls.Though, I think
hoardy-adb
is a better solution for this, since invokingadb backup
repeatedly means you'll have to unlock your phone and press "Back up my data" button on the screen repeatedly,adb backup
followed byhoardy-adb split
is much more convenient. -
Adebar can also generate scripts performing the above-mentioned
adb
commands, but it will also intersperse them withadb shell input
invocations, thus removing the need to manually press anything on the phone.This is a bit flaky, but it's only slightly less convenient than
adb backup
followed byhoardy-adb split
.
-
abpy is a Python utility that can convert Android Backup files into TAR and back, so it's an alternative implementation of
hoardy-adb unwrap
andhoardy-adb wrap
. I was unaware it existed when I made this, and I probably would have patched that instead if I were. After I became aware of it,hoardy-adb
already had more features, so I was simply inspired by encryption passphrase checksum computation code there to implement it properly here (Android code has a bug causing checksums to be computed in a very idiosyncratic way that became a required behaviour when encryption support became the part of the file format), after whichhoardy-adb
gained its ability to produce encrypted.ab
files as outputs. -
ABX is a Python utility that can strip Android Backup headers from unencrypted backup files. So, basically, it's
hoardy-adb unwrap
without decryption support. -
ab2tar
of Adebar is a shell script (requiresopenssl
andzlib-flate
utils) doinghoardy-adb unwrap
thing without decryption support.
backup.ab
produced by adb backup
does not contain the app I want. Can hoardy-adb
help me backup it somehow?
Probably not.
If you only want to backup the APKs, use one of the options noted above instead.
If you want to be able to backup both the APKs and app data states, including the current states of apps not included in backup.ab
, you are probably out of luck.
As noted above, you can force an app to be included in backup.ab
by setting android:allowBackup
in its manifest, re-signing the APK with your own key, and then re-installing the app.
But, you won't be able to install that re-signed APK while the original APK in installed.
You will have to uninstall the app first.
And you will have to repeat the re-signing on each app update.
Yes, unfortunately. I completely agree that this is absolutely stupid. Blame Google for your suffering.
Check if the app in question has a custom backup function, usually somewhere in its settings. If it does, then
-
use it to make a backup,
-
check that the restore function actually works (you'd be surprised how often it does not):
-
the simple safe way to do this is to install the original APK to another phone and then use app's restore function to restore from your backup there;
-
or you can use Shelter from F-Droid to clone the app into your Work Profile and restore the backup there instead;
this does not require a second phone, but it's a bit involved;
see Shelter's help in its "Settings" menu for how to copy your backup files to your Work Profile, as this part will be rather annoying;
-
-
then uninstall the app and install your re-signed version.
You can now use adb backup
for future backups.
If the app does not have a custom backup function, you can either
- root your phone and then use the above "If you have root access on your device" instructions; or
- ask your app's developers to either publish a version of the app with
android:allowBackup
set (signed with their key) or add a custom backup function to the app; or - loose your current data state by uninstalling the app, installing your re-signed APK, and thus, at the very least, stopping data loss from this point on.
A ton of stuff. Simply browse F-Droid's "System" category, or use search.
Also, you can switch to Droidify as your default F-Droid UI, which, IMHO, is nicer than the default one.
See CHANGELOG.md
.
See the bottom of CHANGELOG.md
.
GPLv3+, some small library parts are MIT.
Contributions are accepted both via GitHub issues and PRs, and via pure email.
In the latter case I expect to see patches formatted with git-format-patch
.
If you want to perform a major change and you want it to be accepted upstream here, you should probably write me an email or open an issue on GitHub first.
A handy Swiss-army-knife-like utility for manipulating Android Backup files (backup.ab
, *.ab
, *.adb
) produced by adb backup
, bmgr
, and similar tools.
Android Backup file consists of a metadata header followed by a PAX-formatted TAR file (optionally) compressed with zlib (the only compressing Android Backup file format supports) and then (optionally) encrypted with AES-256 (the only encryption Android Backup file format supports).
Below, all input decryption options apply to all subcommands taking Android Backup files as input(s) and all output encryption options apply to all subcommands producing Android Backup files as output(s).
-
options:
--version
: show program's version number and exit-h, --help
: show this help message and exit--markdown
: show help messages formatted in Markdown
-
input decryption passphrase:
-p PASSPHRASE, --passphrase PASSPHRASE
: passphrase for an encryptedINPUT_AB_FILE
--passfile PASSFILE
: a file containing the passphrase for an encryptedINPUT_AB_FILE
; similar to-p
option but the whole contents of the file will be used verbatim, allowing you to, e.g. use new line symbols or strange character encodings in there; default: guess based onINPUT_AB_FILE
trying to replace ".ab" or ".adb" extension with ".passphrase.txt"
-
input decryption checksum verification:
--ignore-checksum
: ignore checksum field inINPUT_AB_FILE
, useful when decrypting backups produced by weird Android firmwares
-
output encryption passphrase:
--output-passphrase OUTPUT_PASSPHRASE
: passphrase for an encryptedOUTPUT_AB_FILE
--output-passfile OUTPUT_PASSFILE
: a file containing the passphrase for an encryptedOUTPUT_AB_FILE
-
output encryption parameters:
--output-salt-bytes SALT_BYTES
: PBKDF2HMAC salt length in bytes; default: 64--output-iterations ITERATIONS
: PBKDF2HMAC iterations; default: 10000
-
subcommands:
{ls,list,rewrap,strip,ab2ab,split,ab2many,merge,many2ab,unwrap,ab2tar,wrap,tar2ab}
ls (list)
: list contents of an Android Backup filerewrap (strip, ab2ab)
: strip or apply encyption and/or compression from/to an Android Backup filesplit (ab2many)
: split a full-system Android Backup file into a bunch of per-app Android Backup filesmerge (many2ab)
: merge a bunch of Android Backup files into oneunwrap (ab2tar)
: convert an Android Backup file into a TAR filewrap (tar2ab)
: convert a TAR file into an Android Backup file
List contents of an Android Backup file similar to how tar -tvf
would do, but this will also show Android Backup file version, compression, and encryption parameters.
- positional arguments:
INPUT_AB_FILE
: an Android Backup file to be used as input, set to "-" to use standard input
Convert a given Android Backup file into another Android Backup file with encyption and/or compression applied or stripped away.
Versioning parameters and the TAR file stored inside the input file are copied into the output file verbatim.
For instance, with this subcommand you can convert an encrypted and compressed Android Backup file into a simple unencrypted and uncompressed version of the same, or vice versa. The former of which is useful if your Android firmware forces you to encrypt your backups but you store your backups on an encrypted media anyway and don't want to remember more passphrases than strictly necessary. Or if you want to strip encryption and compression and re-compress using something better than zlib.
-
positional arguments:
INPUT_AB_FILE
: an Android Backup file to be used as input, set to "-" to use standard inputOUTPUT_AB_FILE
: file to write the output to, set to "-" to use standard output; default: "-" ifINPUT_TAR_FILE
is "-", otherwise replace ".ab" or ".adb" extension ofINPUT_TAR_FILE
with.stripped.ab
-
options:
-k, --keep-compression
: copy compression flag and data from input to output verbatim; this will make the output into a compressed Android Backup file if the input Android Backup file is compressed and vice versa; this is the fastest way tostrip
, since it just copies bytes around-c, --compress
: (re-)compress the output file; it will use higher compression level defaults than those used by Android; with this option enabledhoardy-adb
will be quite slow; by default, compression will be stripped away-e, --encrypt
: (re-)encrypt the output file; on a modern CPU (with AES-NI) enabling this option costs almost nothing, on an old CPU it will be quite slow; by default, encription will be stripped away
Split a full-system Android Backup file into a bunch of per-app Android Backup files.
Resulting per-app files can be given to adb restore
to restore selected apps.
Also, if you do backups regularly, then splitting large Android Backup files like this and deduplicating per-app files between backups could save a lot of disk space.
-
positional arguments:
INPUT_AB_FILE
: an Android Backup file to be used as input, set to "-" to use standard input
-
options:
-c, --compress
: compress per-app output files; by default, the outputs will be uncompressed-e, --encrypt
: encrypt per-app output files; when enabled, the--output-passphrase
/--output-passfile
and otheroutput encryption parameters
will be reused for all the generated files, but all encryption keys and salts will be unique; by default, the outputs will be unencrypted--prefix PREFIX
: file name prefix for output files; default:hoardy_adb_split_backup
ifINPUT_AB_FILE
is "-",hoardy_adb_split_<INPUT_AB_FILE without its ".ab" or ".adb" extension>
otherwise
Merge many smaller Android Backup files into a single larger one.
A reverse operation to split
.
This exists mostly for checking that split
is not buggy.
-
positional arguments:
INPUT_AB_FILE
: Android Backup files to be used as inputsOUTPUT_AB_FILE
: file to write the output to
-
options:
-c, --compress
: compress the output file; by default, the output will be uncompressed-e, --encrypt
: encrypt the output file; by default, the output will be unencrypted
Convert Android Backup file into a TAR file by stripping Android Backup header, decrypting and decompressing as necessary.
The TAR file stored inside the input file gets copied into the output file verbatim.
- positional arguments:
INPUT_AB_FILE
: an Android Backup file to be used as input, set to "-" to use standard inputOUTPUT_TAR_FILE
: file to write output to, set to "-" to use standard output; default: guess based onINPUT_AB_FILE
while setting extension to.tar
Convert a TAR file into an Android Backup file by prepending Android Backup header, compressing and encrypting as requested.
The input TAR file gets copied into the output file verbatim.
Note that unwrapping a .ab
file, unpacking the resulting .tar
, editing the resulting files, packing them back with GNU tar
utility, running hoardy-adb wrap
, and then running adb restore
on the resulting file will probably crash your Android device (phone or whatever) because the Android-side code restoring from the backup expects the data in the packed TAR to be in a certain order and have certain PAX headers, which GNU tar
will not produce.
So you should only use this on files previously produced by hoardy-adb unwrap
or if you know what it is you are doing.
-
positional arguments:
INPUT_TAR_FILE
: a TAR file to be used as input, set to "-" to use standard inputOUTPUT_AB_FILE
: file to write the output to, set to "-" to use standard output; default: "-" ifINPUT_TAR_FILE
is "-", otherwise replace ".ab" or ".adb" extension ofINPUT_TAR_FILE
with.ab
-
options:
-c, --compress
: compress the output file; by default, the output will be uncompressed-e, --encrypt
: encrypt the output file; by default, the output will be unencrypted--output-version OUTPUT_VERSION
: Android Backup file version to use; required
Giving an encrypted INPUT_AB_FILE
as input, not specifying --passphrase
or --passfile
, and not having a file named {INPUT_AB_FILE with ".ab" or ".adb" extension replaced with ".passphrase.txt"}
in the same directory will cause the passphrase to be read interactively from the tty.
-
List contents of an Android Backup file:
hoardy-adb ls backup.ab
-
Use
tar
util to list contents of an Android Backup file instead of runninghoardy-adb ls
:hoardy-adb unwrap backup.ab - | tar -tvf -
-
Extract contents of an Android Backup file:
hoardy-adb unwrap backup.ab - | tar -xvf -
-
Strip encryption and compression from an Android Backup file:
# equivalent hoardy-adb strip backup.ab backup.stripped.ab hoardy-adb strip backup.ab
# equivalent hoardy-adb strip --passphrase secret backup.ab hoardy-adb strip -p secret backup.ab
# with passphrase taken from a file echo -n secret > backup.passphrase.txt # equivalent hoardy-adb strip backup.ab hoardy-adb strip --passfile backup.passphrase.txt backup.ab
# with a weird passphrase taken from a file echo -ne "secret\r\n\x00another line" > backup.passphrase.txt hoardy-adb strip backup.ab
-
Strip encryption but keep compression, if any:
# equivalent hoardy-adb strip --keep-compression backup.ab backup.stripped.ab hoardy-adb strip -k backup.ab
-
Strip encryption and compression from an Android Backup file and then re-compress using
xz
:hoardy-adb strip backup.ab - | xz --compress -9 - > backup.ab.xz # ... and then convert to tar and list contents: xzcat backup.ab.xz | hoardy-adb unwrap - | tar -tvf -
-
Convert an Android Backup file into a TAR archive:
# equivalent hoardy-adb unwrap backup.ab backup.tar hoardy-adb unwrap backup.ab
-
Convert a TAR archive into an Android Backup file:
# equivalent hoardy-adb wrap --output-version=5 backup.tar backup.ab hoardy-adb wrap --output-version=5 backup.tar
Sanity check and test hoardy-adb
command-line interface.
./test-cli.sh backup.ab backup2.ab