rednaga/APKiD

Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android

58
/ 100
Established

This tool helps cybersecurity analysts and reverse engineers understand how Android applications (APKs) are built. You input an APK file, and it tells you which compilers, packers, or obfuscators were used in its creation. This helps you quickly identify potentially malicious, protected, or pirated apps.

2,431 stars.

Use this if you need to rapidly determine the development and protection methods applied to an Android app.

Not ideal if you're looking for a tool to analyze the functional behavior of an Android app or its network communications.

mobile-security reverse-engineering malware-analysis application-protection android-forensics
No Package No Dependents
Maintenance 10 / 25
Adoption 10 / 25
Maturity 16 / 25
Community 22 / 25

How are scores calculated?

Stars

2,431

Forks

331

Language

YARA

License

Last pushed

Jan 29, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/rednaga/APKiD"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.