• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering APKiD v2.1.1 - Android Application Identifier for Packers, Protectors, Obfuscators

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,457
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
57322793-49be9c00-70b9-11e9-84da-1e64d9459a8a.png


APKiD gives you information about how an APK was made. It identifies many compilers, packers, obfuscators, and other weird stuff. It's PEiD for Android.

Changelog v2.1.1

    Fixed bug with `–output-dir- not working with absolute paths within docker container (#171) – thanks @iantruslove
    Reduce docker layers and sizes – thanks @superpoussin22
    Add scan_file_obj API
    Fixed some error handling
    Add --include-types option
    Fix rule identifier counting
    Improve rule hash stability
    Improve file type detection for ELFs
    If using filename for typing, consider .jar files as zips.


For the rules:

    Beefed up DexGuard detection
    Correct dexlib1 detection
    Add ApppSuit detection – thanks @enovella
    Add SafeEngine detection – thanks @horsicq
    Several other fixes and improvements


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top