areclaw

by TheQmaks · Claude Skill · ★ 23

About areclaw

Android Reverse Engineering Command-Line Automation Workspace. AI-driven security analysis with Claude Code.

androidandroid-securityapkclaude-codedecompilerfridamobile-securitypenetration-testingreverse-engineeringsecurity

Quick Facts

Stars23
Forks2
LanguageJavaScript
CategoryClaude Skill
LicenseMIT
Quality Score36.75/100
Last Updated2026-03-10
Created2026-02-28
Platformsclaude-code, node
Est. Tokens~7k

Compatible Skills

These tools work well together with areclaw for enhanced workflows:

More Claude Skill Tools

Explore other popular claude skill tools:

View all Claude Skill tools →

Popular JavaScript Agent Tools

Frequently Asked Questions

What is areclaw?

areclaw is Android Reverse Engineering Command-Line Automation Workspace. AI-driven security analysis with Claude Code.. It is categorized as a Claude Skill with 23 GitHub stars.

What programming language is areclaw written in?

areclaw is primarily written in JavaScript. It covers topics such as android, android-security, apk.

How do I install or use areclaw?

You can find installation instructions and usage details in the areclaw GitHub repository at github.com/TheQmaks/areclaw. The project has 23 stars and 2 forks, indicating an active community.

What license does areclaw use?

areclaw is released under the MIT license, making it free to use and modify according to the license terms.

View on GitHub → Browse Claude Skill tools