icloudza / algokiller-plugin
PublicARM64 trace evidence analysis & cipher algorithm recovery — Claude Desktop plugin with skills + local MCP server driving the native ak_search engine over GB-scale trace files
A plugin for Claude Desktop that equips AI with tools to analyze large execution traces from mobile apps, recovering encryption algorithms and tracing data flows.
How It Works
You hear about a clever plugin that helps AI assistants uncover hidden codes and patterns in app recordings from phones.
Using a simple recorder tool, you capture what an app does on your phone during login or messaging, saving it as a trace file on your computer.
In your Claude Desktop app, you add the plugin with a quick marketplace command, and it's ready to use.
You share the trace file with your AI and ask it to recover a secret cipher or explain app behavior using special commands like /algokiller.
The AI searches for clues like encryption constants, call patterns, and data flows, sharing breakdowns and reminders to stay on track.
Your recovered code and analysis reports get saved automatically in a personal folder for easy review.
You now have clear explanations and working code recreating the app's hidden algorithms, ready to understand or test further.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.