rednaga/APKiD
Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
This tool helps cybersecurity analysts and reverse engineers understand how Android applications (APKs) are built. You input an APK file, and it tells you which compilers, packers, or obfuscators were used in its creation. This helps you quickly identify potentially malicious, protected, or pirated apps.
2,431 stars.
Use this if you need to rapidly determine the development and protection methods applied to an Android app.
Not ideal if you're looking for a tool to analyze the functional behavior of an Android app or its network communications.
Stars
2,431
Forks
331
Language
YARA
License
—
Category
Last pushed
Jan 29, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/rednaga/APKiD"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Related frameworks
0xfke/Malware-Detection-and-Analysis-using-Machine-Learning
Malware🦠Detection and Analysis using Machine Learning (MDAML) is designed to provide users with...
rieck/malheur
A Tool for Automatic Analysis of Malware Behavior
AFAgarap/malware-classification
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support...
Kiinitix/Malware-Detection-using-Machine-learning
Anomaly based Malware Detection using Machine Learning (PE and URL)
CalebFenton/apkfile
Android app analysis and feature extraction library