SimoneAvogadro

Claude Code skill to support Android app's reverse engineering

118
16
69% credibility
Found Feb 04, 2026 at 47 stars 3x -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Shell
AI Summary

A Claude Code plugin that unpacks Android app files to reveal their code structure and server communication patterns for analysis.

How It Works

1
🕵️ Discover the app explorer

You hear about a helpful tool inside your AI coding workspace that lets you peek inside Android apps to understand how they work.

2
Add the tool

With a couple of simple commands, you bring this explorer into your workspace so it's always ready to use.

3
⚙️ Prepare your setup

Run a quick check to see what's needed, and let it automatically grab any missing helpers to get everything ready.

4
📱 Unpack an app

Pick an Android app file you want to study, and watch as it reveals the inner code and structure in a new folder.

5
🔍 Hunt for connections

Search through the unpacked code to spot how the app connects to websites and servers, like login spots or data sends.

Unlock app secrets

Now you have a clear map of the app's communications and flows, perfect for learning or safe research.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 47 to 118 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is android-reverse-engineering-skill?

This Shell-powered Claude Code skill decompiles Android app's APK, XAPK, JAR, and AAR files using tools like jadx and Fernflower, extracting HTTP APIs such as Retrofit endpoints, OkHttp calls, hardcoded URLs, and auth patterns. It traces call flows from Activities to repositories and analyzes app structure, even on obfuscated code. Upload an APK in Claude Code, run /decompile, and get documented APIs ready to mock or reproduce.

Why is it gaining traction?

Unlike standalone decompilers, it plugs directly into Claude Code agents via github integration—check claude code install from the marketplace or claude code github for one-command setup. API hunting scripts spotlight Retrofit, OkHttp, and Volley patterns instantly, slashing manual search time. Low claude code price (free tier works) hooks devs testing claude code web with real Android reverse tasks.

Who should use this?

Android security researchers dissecting malware APIs, pentesters mapping app's endpoints for authorized audits, and interoperability devs cloning closed-source services. Suits CTF players or incident responders needing fast call flow traces without full JADX GUIs.

Verdict

Worth adding for niche Android work—strong claude code docs and scripts make it practical despite 64 stars and 0.7% credibility score signaling early maturity. Pair with claude github pr review for safer forks; skip if you need battle-tested scale.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.