androguard
Reverse engineer and analyze Android applications
TLDR
Analyze an APK file
SYNOPSIS
androguard command [options] apkfile_
DESCRIPTION
androguard is a Python tool for reverse engineering, malware analysis, and security assessment of Android applications. It can analyze APK files, decompile DEX code, parse Android manifests, and extract permissions and components.
The tool provides both command-line utilities and a Python API for programmatic analysis, making it useful for both manual review and automated security scanning.
PARAMETERS
analyze
Interactive analysis sessiondecompile
Decompile APK to Java source codedisassemble
Disassemble DEX to smaliaxml
Parse and display Android XML filessign
Analyze APK signaturescg
Generate call graph-o dir
Output directory-i file
Input file-f format
Output format
CAVEATS
Decompilation is not always perfect; obfuscated code may be difficult to read. Some native code cannot be analyzed. Analysis of large APKs may consume significant memory.
HISTORY
androguard was developed by Anthony Desnos starting around 2012. It became one of the primary open-source tools for Android application security analysis.
