• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering APKiD v2.1.4 - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,456
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
57322793-49be9c00-70b9-11e9-84da-1e64d9459a8a.png


APKiD gives you information about how an APK was made. It identifies many compilers, packers, obfuscators, and other weird stuff. It’s PEiD for Android.

Changelog v2.1.4

The following products got improvements, rules and fixes:

    Packers:
        Multidex inline implementation
        EpicVM (ex-ULTIMA protector)
        Jiagu ELF packer
        DexProtector
        LIAPP
    Protectors:
        DexGuard v9.x (Aarch64)
        DexProtector telemetry (Alice), native (ARM32) and APK files
        FreeRASP
    Obfuscators:
        OLLVM v5, v8, v9 (with and without string encryption)
        ADVObfuscator (in PGSharp)


Additionally,

    Update to Python 3.9
    Update yara-python-dex dependency


To see this hidden content, you must like this content.
 
Last edited by a moderator:
Status
Not open for further replies.
Back
Top