SimoneAvogadro/android-reverse-engineering-skill
4,712 stars · Last commit 2026-03-02
Claude Code skill to support Android app's reverse engineering
README preview
# Android Reverse Engineering & API Extraction — Claude Code skill A Claude Code skill that decompiles Android APK/XAPK/JAR/AAR files and **extracts the HTTP APIs** used by the app — Retrofit endpoints, OkHttp calls, hardcoded URLs, authentication patterns — so you can document and reproduce them without the original source code. ## What it does - **Decompiles** APK, XAPK, JAR, and AAR files using jadx and Fernflower/Vineflower (single engine or side-by-side comparison) - **Extracts and documents APIs**: Retrofit endpoints, OkHttp calls, hardcoded URLs, auth headers and tokens - **Traces call flows** from Activities/Fragments through ViewModels and repositories down to HTTP calls - **Analyzes** app structure: manifest, packages, architecture patterns - **Handles obfuscated code**: strategies for navigating ProGuard/R8 output ## Requirements **Required:** - Java JDK 17+ - [jadx](https://github.com/skylot/jadx) (CLI) **Optional (recommended):** - [Vineflower](https://github.com/Vineflower/vineflower) or [Fernflower](https://github.com/JetBrains/fernflower) — better output on complex Java code