Update README to highlight API extraction, fix author name in metadata
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
@@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"name": "android-reverse-engineering-skill",
|
||||||
|
"owner": {
|
||||||
|
"name": "Simone Avogadro"
|
||||||
|
},
|
||||||
|
"metadata": {
|
||||||
|
"description": "Claude Code plugins for Android reverse engineering",
|
||||||
|
"version": "1.0.0"
|
||||||
|
},
|
||||||
|
"plugins": [
|
||||||
|
{
|
||||||
|
"name": "android-reverse-engineering",
|
||||||
|
"source": "./plugins/android-reverse-engineering",
|
||||||
|
"description": "Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.",
|
||||||
|
"version": "1.0.0",
|
||||||
|
"author": {
|
||||||
|
"name": "Simone Avogadro"
|
||||||
|
},
|
||||||
|
"repository": "https://github.com/simonea/android-reverse-engineering-skill",
|
||||||
|
"license": "Apache-2.0",
|
||||||
|
"keywords": ["android", "reverse-engineering", "apk", "jadx", "decompile", "api-extraction"],
|
||||||
|
"category": "security"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
@@ -1,13 +1,13 @@
|
|||||||
# Android Reverse Engineering — Claude Code Plugin
|
# Android Reverse Engineering & API Extraction — Claude Code Plugin
|
||||||
|
|
||||||
A Claude Code plugin for decompiling Android APK/XAPK/JAR/AAR files with jadx, tracing call flows through application code, and documenting extracted APIs.
|
A Claude Code plugin that decompiles Android APK/XAPK/JAR/AAR files and **extracts the HTTP APIs** used by the app — Retrofit endpoints, OkHttp calls, hardcoded URLs, authentication patterns — so you can document and reproduce them without the original source code.
|
||||||
|
|
||||||
## What it does
|
## What it does
|
||||||
|
|
||||||
- **Decompiles** APK, XAPK, JAR, and AAR files using jadx and Fernflower/Vineflower (single engine or side-by-side comparison)
|
- **Decompiles** APK, XAPK, JAR, and AAR files using jadx and Fernflower/Vineflower (single engine or side-by-side comparison)
|
||||||
- **Analyzes** app structure: manifest, packages, architecture patterns
|
- **Extracts and documents APIs**: Retrofit endpoints, OkHttp calls, hardcoded URLs, auth headers and tokens
|
||||||
- **Traces call flows** from Activities/Fragments through ViewModels and repositories down to HTTP calls
|
- **Traces call flows** from Activities/Fragments through ViewModels and repositories down to HTTP calls
|
||||||
- **Extracts and documents APIs**: Retrofit endpoints, OkHttp calls, hardcoded URLs, auth patterns
|
- **Analyzes** app structure: manifest, packages, architecture patterns
|
||||||
- **Handles obfuscated code**: strategies for navigating ProGuard/R8 output
|
- **Handles obfuscated code**: strategies for navigating ProGuard/R8 output
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
"version": "1.0.0",
|
"version": "1.0.0",
|
||||||
"description": "Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.",
|
"description": "Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.",
|
||||||
"author": {
|
"author": {
|
||||||
"name": "simonea"
|
"name": "Simone Avogadro"
|
||||||
},
|
},
|
||||||
"repository": "https://github.com/simonea/android-reverse-engineering-skill",
|
"repository": "https://github.com/simonea/android-reverse-engineering-skill",
|
||||||
"license": "Apache-2.0"
|
"license": "Apache-2.0"
|
||||||
|
|||||||
Reference in New Issue
Block a user