Android Reverse Engineering Workflow
CommunityDecompile, analyze, and document Android apps.
Software Engineering#android#reverse engineering#mobile security#jadx#decompilation#api extraction#fernflower
Authorvichhka-git
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill automates the complex and time-consuming process of reverse engineering Android applications, enabling you to understand their internal workings and extract valuable API information without access to the original source code.
Core Features & Use Cases
- Decompilation: Converts APK, XAPK, JAR, and AAR files into readable Java source code using multiple decompiler engines (jadx, Fernflower/Vineflower).
- API Extraction: Identifies and documents Retrofit endpoints, OkHttp calls, hardcoded URLs, and authentication patterns.
- Call Flow Tracing: Maps execution paths from UI elements to network calls, aiding in understanding app logic and security.
- Use Case: A security researcher needs to understand how a mobile banking app handles sensitive data transmission. This Skill can decompile the app, identify all API endpoints used for transactions, and trace the flow of authentication tokens.
Quick Start
Use the Android Reverse Engineering Workflow skill to decompile the provided APK file and extract its API calls.
Dependency Matrix
Required Modules
None requiredComponents
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: Android Reverse Engineering Workflow Download link: https://github.com/vichhka-git/android-reverse-engineering-mcp-server/archive/main.zip#android-reverse-engineering-workflow Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.