by SimoneAvogadro · Claude Skill · ★ 5.3k
Last updated: · Indexed by AgentSkillsHub · Auto-synced every 8h
Android Reverse Engineering & API Extraction — Claude Code skill A Claude Code skill that decompiles Android APK/XAPK/JAR/AAR files and extracts the HTTP APIs used by the app — Retrofit endpoints, OkHttp calls, hardcoded URLs, authentication patterns — so you can document and reproduce them without the original source code. Windows / PowerShell support (experimental): The scripts alongside the bash ones are a recent community contribution, still being stabilised. For any issues please open an issue on this repository (not on the contributors' upstream forks): the PowerShell scripts are maintained here by @SimoneAvogadro. Table of Contents What it does Requirements Installation Usage Repository Structure References Acknowledgments Disclaimer [
| Stars | 5,256 |
| Forks | 595 |
| Language | Shell |
| Category | Claude Skill |
| License | Apache-2.0 |
| Quality Score | 56.11/100 |
| Open Issues | 4 |
| Last Updated | 2026-04-27 |
| Created | 2026-02-02 |
| Platforms | claude-code, cli |
| Est. Tokens | ~11k |
These tools work well together with android-reverse-engineering-skill for enhanced workflows:
Explore other popular claude skill tools:
android-reverse-engineering-skill is Claude Code skill to support Android app's reverse engineering. It is categorized as a Claude Skill with 5.3k GitHub stars.
android-reverse-engineering-skill is primarily written in Shell.
You can find installation instructions and usage details in the android-reverse-engineering-skill GitHub repository at github.com/SimoneAvogadro/android-reverse-engineering-skill. The project has 5.3k stars and 595 forks, indicating an active community.
android-reverse-engineering-skill is released under the Apache-2.0 license, making it free to use and modify according to the license terms.