APKiD gives you information about how an APK was made. It identifies many compilers, packers, obfuscators, and other weird stuff. It’s PEiD for Android.
APKiD can be used for:
+ Android Compiler Fingerprinting
Compiler fingerprinting is a technique for identifying the compiler used to create a binary. This is because there is some flexibility in file formats, and different compilers usually produce binaries with identical behaviors but with subtle differences in structure and organization. We developed a tool which can determine the compiler used to create Dalvik executables and Android binary XML files.
+ Detecting Pirated and Malicious Android Apps
Why is this important? Any app which has had malware injected into it or has been cracked or pirated will have probably been disassembled and recompiled by dexlib. Also, there are very few reasons why a developer with access to the source code would use dexlib. Therefore, you know an app has been modified by dexlib, it’s probably interesting to you if you’re worried about malware or app piracy.
Usage and install:
git clone https://github.com/rednaga/yara-python && cd yara-python python setup.py install git clone https://github.com/rednaga/APKiD && cd APKiD python setup.py install Example: apkid -j FILE sample.apk
Source: https://github.com/rednaga