diff --git a/.claude-plugin/marketplace.json b/.claude-plugin/marketplace.json new file mode 100644 index 0000000..b9aa035 --- /dev/null +++ b/.claude-plugin/marketplace.json @@ -0,0 +1,25 @@ +{ + "name": "android-reverse-engineering-skill", + "owner": { + "name": "Simone Avogadro" + }, + "metadata": { + "description": "Claude Code plugins for Android reverse engineering", + "version": "1.0.0" + }, + "plugins": [ + { + "name": "android-reverse-engineering", + "source": "./plugins/android-reverse-engineering", + "description": "Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.", + "version": "1.0.0", + "author": { + "name": "Simone Avogadro" + }, + "repository": "https://github.com/simonea/android-reverse-engineering-skill", + "license": "Apache-2.0", + "keywords": ["android", "reverse-engineering", "apk", "jadx", "decompile", "api-extraction"], + "category": "security" + } + ] +} diff --git a/README.md b/README.md index efe646c..e2948d4 100644 --- a/README.md +++ b/README.md @@ -1,13 +1,13 @@ -# Android Reverse Engineering — Claude Code Plugin +# Android Reverse Engineering & API Extraction — Claude Code Plugin -A Claude Code plugin for decompiling Android APK/XAPK/JAR/AAR files with jadx, tracing call flows through application code, and documenting extracted APIs. +A Claude Code plugin that decompiles Android APK/XAPK/JAR/AAR files and **extracts the HTTP APIs** used by the app — Retrofit endpoints, OkHttp calls, hardcoded URLs, authentication patterns — so you can document and reproduce them without the original source code. ## What it does - **Decompiles** APK, XAPK, JAR, and AAR files using jadx and Fernflower/Vineflower (single engine or side-by-side comparison) -- **Analyzes** app structure: manifest, packages, architecture patterns +- **Extracts and documents APIs**: Retrofit endpoints, OkHttp calls, hardcoded URLs, auth headers and tokens - **Traces call flows** from Activities/Fragments through ViewModels and repositories down to HTTP calls -- **Extracts and documents APIs**: Retrofit endpoints, OkHttp calls, hardcoded URLs, auth patterns +- **Analyzes** app structure: manifest, packages, architecture patterns - **Handles obfuscated code**: strategies for navigating ProGuard/R8 output ## Requirements diff --git a/plugins/android-reverse-engineering/.claude-plugin/plugin.json b/plugins/android-reverse-engineering/.claude-plugin/plugin.json index 9b21626..067552f 100644 --- a/plugins/android-reverse-engineering/.claude-plugin/plugin.json +++ b/plugins/android-reverse-engineering/.claude-plugin/plugin.json @@ -3,7 +3,7 @@ "version": "1.0.0", "description": "Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.", "author": { - "name": "simonea" + "name": "Simone Avogadro" }, "repository": "https://github.com/simonea/android-reverse-engineering-skill", "license": "Apache-2.0"