AIBestSkill
Security review · Claude Code Skill

Android Reverse Engineering & API Extraction — Claude Code skill adoption decision

Inspect code, apps, APIs, or agent workflows for security risks before adoption or release. Decompile Android APK, XAPK, JAR, and AAR files using jadx or Fernflower/Vineflower. Reverse engineer Android apps, extract HTTP API endpoints (Retrofit, OkHttp, Volley)...

Job to solvesecurity analysis and review

Inspect code, apps, APIs, or agent workflows for security risks before adoption or release.

Who should use itSecurity-minded developers reviewing repositories, reverse-engineering APIs, or auditing agent workflows.

Use this as a fit check before reading install commands.

Works withClaude Code

Platform fit comes after the use case, not before it.

Adoption pathNeeds adoption review

No trusted setup command was extracted yet. Open the source evidence before adopting it.

Trust signalREADME + SKILL.md

1 SKILL.md + README evidence, 5,359 stars, and 1d ago repo freshness at last scan.

Overview

What job does it solve?Security review

Inspect code, apps, APIs, or agent workflows for security risks before adoption or release.

Who should use it?Security-minded developers reviewing repositories, reverse-engineering APIs, or auditing agent workflows.

security analysis and review for Claude Code users.

Works withClaude Code

Check platform compatibility after confirming the use case fits your workflow.

How can I adopt it?Needs adoption review

No trusted setup command was extracted yet. Open the source evidence before adopting it.

Can I trust it?README + SKILL.md

1 SKILL.md + README evidence, 5,359 stars, and 1d ago repo freshness at last scan.

What to compare?5 related skills

Use the comparison list below to avoid adopting the first matching repo blindly.

Quick read

Decompile Android APK, XAPK, JAR, and AAR files using jadx or Fernflower/Vineflower. Reverse engineer Android apps, extract HTTP API endpoints (Retrofit, OkHttp, Volley), and trace call flows from UI to network layer.

Claude Code skill to support Android app's reverse engineering

Why we list it
  • Public because this is a source-backed skill-like repo with enough current evidence to qualify for the shortlist.
  • Current GitHub metadata is available for SimoneAvogadro/android-reverse-engineering-skill.
  • 1 SKILL.md file(s) were found in the recursive tree scan.
  • README content is available as part of the public evidence set.

Adoption path for Android Reverse Engineering & API Extraction — Claude Code skill

Needs adoption review: no trusted setup path was extracted yet.

Source evidence

Source excerpts used for this adoption decision. Low-confidence cases link back to GitHub instead of forcing a misleading quote.

README excerpt

README.md

Installation

From GitHub (recommended)

Inside Claude Code, run:

/plugin marketplace add SimoneAvogadro/android-reverse-engineering-skill
/plugin install android-reverse-engineering@android-reverse-engineering-skill

The skill will be permanently available in all future sessions.

Usage

Slash command
/decompile path/to/app.apk

This runs the full workflow: dependency check, decompilation, and initial structure analysis.

Install a missing dependency (auto-detects OS and package manager)

bash plugins/android-reverse-engineering/skills/android-reverse-engineering/scripts/install-dep.sh jadx

bash plugins/android-reverse-engineering/skills/android-reverse-engineering/scripts/install-dep.sh vineflower

Show scanned SKILL.md paths (1)
  • plugins/android-reverse-engineering/skills/android-reverse-engineering/SKILL.md