android-reverse-engineering
反編譯 Android APK/XAPK/JAR/AAR,並擷取/記錄 HTTP API(Retrofit/OkHttp/URL),提供可重複的工作流程。
SKILL.md
Decompile Android APK, XAPK, JAR, and AAR files using jadx and Fernflower/Vineflower, trace call flows through application code and libraries, and produce structured documentation of extracted APIs. Two decompiler engines are supported — jadx for broad Android coverage and Fernflower for higher-quality output on complex Java code — and can be used together for comparison.
This skill requires Java JDK 17+ and jadx to be installed. Fernflower/Vineflower and dex2jar are optional but recommended for better decompilation quality. Run the dependency checker to verify:
If anything is missing, follow the installation instructions in ${CLAUDEPLUGINROOT}/skills/android-reverse-engineering/references/setup-guide.md.
反編譯 Android APK/XAPK/JAR/AAR,並擷取/記錄 HTTP API(Retrofit/OkHttp/URL),提供可重複的工作流程。 來源:gmh5225/android-reverse-engineering-skill。
可引用資訊
為搜尋與 AI 引用準備的穩定欄位與指令。
- 安裝指令
npx skills add https://github.com/gmh5225/android-reverse-engineering-skill --skill android-reverse-engineering- 分類
- </>開發工具
- 認證
- —
- 收錄時間
- 2026-02-04
- 更新時間
- 2026-02-18
快速解答
什麼是 android-reverse-engineering?
反編譯 Android APK/XAPK/JAR/AAR,並擷取/記錄 HTTP API(Retrofit/OkHttp/URL),提供可重複的工作流程。 來源:gmh5225/android-reverse-engineering-skill。
如何安裝 android-reverse-engineering?
開啟你的終端機或命令列工具(如 Terminal、iTerm、Windows Terminal 等) 複製並執行以下指令:npx skills add https://github.com/gmh5225/android-reverse-engineering-skill --skill android-reverse-engineering 安裝完成後,技能將自動設定到你的 AI 程式設計環境中,可以在 Claude Code 或 Cursor 中使用
這個 Skill 的原始碼在哪?
https://github.com/gmh5225/android-reverse-engineering-skill
詳情
- 分類
- </>開發工具
- 來源
- user
- 收錄時間
- 2026-02-04