apkingo is an APK analysis tool written in Go. It extracts information from Android applications, such as permissions, metadata, certificate details, and integrates with VirusTotal and Koodous for malware detection.
- General Info: Package name, version, main activity, SDK versions
- Hashes: MD5, SHA1, SHA256
- Permissions: Complete list of requested permissions
- Metadata: Application metadata
- Certificate: Serial, thumbprint, validity, issuer, subject
- Play Store Integration: Scrapes application info from Google Play Store
- VirusTotal Analysis (requires VirusTotal API key):
- Malware detection stats with highlighted red flags
- Popular threat classification (e.g., "trojan.pegasus/chrysaor")
- File reputation score
- Community detection (Sigma, YARA, IDS)
- File tags and characteristics
- VirusTotal Androguard (automatic with VirusTotal API key):
- Complete APK structure analysis
- Activities, Services, Providers, Receivers
- Libraries and SDK versions
- Dangerous permissions highlighted in red
- Koodous Integration (requires Koodous API key):
- Malware detection status
- Community rating and trust score
- Positive/Negative votes
- Repository information when available
- Enhanced Terminal Output: Colored results with bold red warnings for malware indicators
- JSON Export: Complete analysis export including all VirusTotal/Koodous data
- No Color Mode: Disable colored output for logging
Download the pre-compiled binary for your system from the Releases page.
go install github.com/andpalmier/apkingo/cmd/apkingo@latestbrew tap andpalmier/tap
brew install apkingoYou can run apkingo directly using Docker without installing Go or downloading binaries.
# Analyze an APK (mount the directory containing the APK)
docker run --rm -v $(pwd):/mnt ghcr.io/andpalmier/apkingo -apk /mnt/target.apk
# Analyze and export JSON report
docker run --rm -v $(pwd):/mnt ghcr.io/andpalmier/apkingo -apk /mnt/target.apk -json /mnt/report.jsonapkingo -apk <path_to_apk> [options]For enhanced analysis, you can provide API keys for VirusTotal and Koodous either via command-line flags or environment variables:
Environment Variables (Recommended):
export VT_API_KEY="your_virustotal_api_key"
export KOODOUS_API_KEY="your_koodous_api_key"
apkingo -apk <path_to_apk>Command-Line Flags:
apkingo -apk <path_to_apk> -vtapi <YOUR_VT_KEY> -kapi <YOUR_KOODOUS_KEY>| Flag | Description |
|---|---|
-apk |
Path to the APK file to analyze (required) |
-json |
Path to export analysis in JSON format |
-country |
Country code of the Play Store (default: "us") |
-vtapi |
VirusTotal API key (can also use VT_API_KEY env var) |
-kapi |
Koodous API key (can also use KOODOUS_API_KEY env var) |
-vtupload |
Upload the APK to VirusTotal after analysis (interactive prompt) |
-nocolor |
Disable colored output |
apkingo -apk <path_to_apk>apkingo analyzing an Android malware:
- shogo82148/androidbinary: GitHub repo and Go reference
- avast/apkverifier: GitHub repo and Go reference
- fatih/color: GitHub repo and Go reference
- n0madic/google-play-scraper: GitHub repo and Go reference
- parnurzeal/gorequest: GitHub repo and Go reference
- VirusTotal/vt-go: GitHub repo and Go reference
- VirusTotal API documentation
- Koodous API documentation

