·android-reverse-engineering
</>

android-reverse-engineering

gmh5225/android-reverse-engineering-skill

反編譯 Android APK/XAPK/JAR/AAR,並擷取/記錄 HTTP API(Retrofit/OkHttp/URL),提供可重複的工作流程。

1安裝·0熱度·@gmh5225

安裝

$npx skills add https://github.com/gmh5225/android-reverse-engineering-skill --skill android-reverse-engineering

SKILL.md

Decompile Android APK, XAPK, JAR, and AAR files using jadx and Fernflower/Vineflower, trace call flows through application code and libraries, and produce structured documentation of extracted APIs. Two decompiler engines are supported — jadx for broad Android coverage and Fernflower for higher-quality output on complex Java code — and can be used together for comparison.

This skill requires Java JDK 17+ and jadx to be installed. Fernflower/Vineflower and dex2jar are optional but recommended for better decompilation quality. Run the dependency checker to verify:

If anything is missing, follow the installation instructions in ${CLAUDEPLUGINROOT}/skills/android-reverse-engineering/references/setup-guide.md.

反編譯 Android APK/XAPK/JAR/AAR,並擷取/記錄 HTTP API(Retrofit/OkHttp/URL),提供可重複的工作流程。 來源:gmh5225/android-reverse-engineering-skill。

查看原文

可引用資訊

為搜尋與 AI 引用準備的穩定欄位與指令。

安裝指令
npx skills add https://github.com/gmh5225/android-reverse-engineering-skill --skill android-reverse-engineering
分類
</>開發工具
認證
收錄時間
2026-02-04
更新時間
2026-02-18

快速解答

什麼是 android-reverse-engineering?

反編譯 Android APK/XAPK/JAR/AAR,並擷取/記錄 HTTP API(Retrofit/OkHttp/URL),提供可重複的工作流程。 來源:gmh5225/android-reverse-engineering-skill。

如何安裝 android-reverse-engineering?

開啟你的終端機或命令列工具(如 Terminal、iTerm、Windows Terminal 等) 複製並執行以下指令:npx skills add https://github.com/gmh5225/android-reverse-engineering-skill --skill android-reverse-engineering 安裝完成後,技能將自動設定到你的 AI 程式設計環境中,可以在 Claude Code 或 Cursor 中使用

這個 Skill 的原始碼在哪?

https://github.com/gmh5225/android-reverse-engineering-skill

詳情

分類
</>開發工具
來源
user
收錄時間
2026-02-04

相關 Skills

暫無