Update README to highlight API extraction, fix author name in metadata

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
Simone Avogadro
2026-02-02 20:19:18 +01:00
parent fc9a722359
commit d7fefe54f2
3 changed files with 30 additions and 5 deletions

View File

@@ -0,0 +1,25 @@
{
"name": "android-reverse-engineering-skill",
"owner": {
"name": "Simone Avogadro"
},
"metadata": {
"description": "Claude Code plugins for Android reverse engineering",
"version": "1.0.0"
},
"plugins": [
{
"name": "android-reverse-engineering",
"source": "./plugins/android-reverse-engineering",
"description": "Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.",
"version": "1.0.0",
"author": {
"name": "Simone Avogadro"
},
"repository": "https://github.com/simonea/android-reverse-engineering-skill",
"license": "Apache-2.0",
"keywords": ["android", "reverse-engineering", "apk", "jadx", "decompile", "api-extraction"],
"category": "security"
}
]
}

View File

@@ -1,13 +1,13 @@
# Android Reverse Engineering — Claude Code Plugin
# Android Reverse Engineering & API Extraction — Claude Code Plugin
A Claude Code plugin for decompiling Android APK/XAPK/JAR/AAR files with jadx, tracing call flows through application code, and documenting extracted APIs.
A Claude Code plugin that decompiles Android APK/XAPK/JAR/AAR files and **extracts the HTTP APIs** used by the app — Retrofit endpoints, OkHttp calls, hardcoded URLs, authentication patterns — so you can document and reproduce them without the original source code.
## What it does
- **Decompiles** APK, XAPK, JAR, and AAR files using jadx and Fernflower/Vineflower (single engine or side-by-side comparison)
- **Analyzes** app structure: manifest, packages, architecture patterns
- **Extracts and documents APIs**: Retrofit endpoints, OkHttp calls, hardcoded URLs, auth headers and tokens
- **Traces call flows** from Activities/Fragments through ViewModels and repositories down to HTTP calls
- **Extracts and documents APIs**: Retrofit endpoints, OkHttp calls, hardcoded URLs, auth patterns
- **Analyzes** app structure: manifest, packages, architecture patterns
- **Handles obfuscated code**: strategies for navigating ProGuard/R8 output
## Requirements

View File

@@ -3,7 +3,7 @@
"version": "1.0.0",
"description": "Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.",
"author": {
"name": "simonea"
"name": "Simone Avogadro"
},
"repository": "https://github.com/simonea/android-reverse-engineering-skill",
"license": "Apache-2.0"