android-reverse-engineering-skill — Claude Skill by SimoneAvogadro

by SimoneAvogadro · Claude Skill · ★ 5.3k

Last updated: · Indexed by AgentSkillsHub · Auto-synced every 8h

About android-reverse-engineering-skill

Android Reverse Engineering & API Extraction — Claude Code skill A Claude Code skill that decompiles Android APK/XAPK/JAR/AAR files and extracts the HTTP APIs used by the app — Retrofit endpoints, OkHttp calls, hardcoded URLs, authentication patterns — so you can document and reproduce them without the original source code. Windows / PowerShell support (experimental): The scripts alongside the bash ones are a recent community contribution, still being stabilised. For any issues please open an issue on this repository (not on the contributors' upstream forks): the PowerShell scripts are maintained here by @SimoneAvogadro. Table of Contents What it does Requirements Installation Usage Repository Structure References Acknowledgments Disclaimer [

Quick Facts

Stars5,256
Forks595
LanguageShell
CategoryClaude Skill
LicenseApache-2.0
Quality Score56.11/100
Open Issues4
Last Updated2026-04-27
Created2026-02-02
Platformsclaude-code, cli
Est. Tokens~11k

Compatible Skills

These tools work well together with android-reverse-engineering-skill for enhanced workflows:

  • verify — semantic(0.27)+complementary+same_lang+similar_pop+shared_platform (54%)
  • tutor-skills — semantic(0.21)+complementary+same_lang+similar_pop+shared_platform (52%)
  • makepad-skills — semantic(0.21)+complementary+same_lang+similar_pop+shared_platform (52%)
  • cc-trace — semantic(0.16)+complementary+same_lang+similar_pop+shared_platform (51%)

More Claude Skill Tools

Explore other popular claude skill tools:

View all Claude Skill tools →

Popular Shell Agent Tools

Frequently Asked Questions

What is android-reverse-engineering-skill?

android-reverse-engineering-skill is Claude Code skill to support Android app's reverse engineering. It is categorized as a Claude Skill with 5.3k GitHub stars.

What programming language is android-reverse-engineering-skill written in?

android-reverse-engineering-skill is primarily written in Shell.

How do I install or use android-reverse-engineering-skill?

You can find installation instructions and usage details in the android-reverse-engineering-skill GitHub repository at github.com/SimoneAvogadro/android-reverse-engineering-skill. The project has 5.3k stars and 595 forks, indicating an active community.

What license does android-reverse-engineering-skill use?

android-reverse-engineering-skill is released under the Apache-2.0 license, making it free to use and modify according to the license terms.

View on GitHub → Browse Claude Skill tools