Android Reverse Engineering Workflow

Community

Decompile, analyze, and document Android apps.

Authorvichhka-git
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill automates the complex and time-consuming process of reverse engineering Android applications, enabling you to understand their internal workings and extract valuable API information without access to the original source code.

Core Features & Use Cases

  • Decompilation: Converts APK, XAPK, JAR, and AAR files into readable Java source code using multiple decompiler engines (jadx, Fernflower/Vineflower).
  • API Extraction: Identifies and documents Retrofit endpoints, OkHttp calls, hardcoded URLs, and authentication patterns.
  • Call Flow Tracing: Maps execution paths from UI elements to network calls, aiding in understanding app logic and security.
  • Use Case: A security researcher needs to understand how a mobile banking app handles sensitive data transmission. This Skill can decompile the app, identify all API endpoints used for transactions, and trace the flow of authentication tokens.

Quick Start

Use the Android Reverse Engineering Workflow skill to decompile the provided APK file and extract its API calls.

Dependency Matrix

Required Modules

None required

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: Android Reverse Engineering Workflow
Download link: https://github.com/vichhka-git/android-reverse-engineering-mcp-server/archive/main.zip#android-reverse-engineering-workflow

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.