by CreditTone · Codex Skill · ★ 62
这是一套专为 Codex 适配的 Android 逆向分析 skill,支持在 Codex 会话中反编译 APK、XAPK、JAR、AAR,并结合 jadx、Fernflower/Vineflower 梳理 Manifest、包结构、网络层和调用链。它可辅助提取接口、URL、鉴权头、token 与签名逻辑,并提供 Frida、抓包、JNI/SO 分析前的静态侦察方法,适合接口分 析、安全研究和授权测试。
| Stars | 62 |
| Forks | 7 |
| Language | JavaScript |
| Category | Codex Skill |
| License | Apache-2.0 |
| Quality Score | 43.75/100 |
| Last Updated | 2026-05-07 |
| Created | 2026-03-29 |
| Platforms | claude-code, codex, node |
| Est. Tokens | ~8k |
Explore other popular codex skill tools:
android-reverse-engineering-skill is 这是一套专为 Codex 适配的 Android 逆向分析 skill,支持在 Codex 会话中反编译 APK、XAPK、JAR、AAR,并结合 jadx、Fernflower/Vineflower 梳理 Manifest、包结构、网络层和调用链。它可辅助提取接口、URL、鉴权头、token 与签名逻辑,并提供 Frida、抓包、JNI/SO 分析前的静态侦察方法,适合接口分 析、安全研. It is categorized as a Codex Skill with 62 GitHub stars.
android-reverse-engineering-skill is primarily written in JavaScript. It covers topics such as android, claude-code, codex.
You can find installation instructions and usage details in the android-reverse-engineering-skill GitHub repository at github.com/CreditTone/android-reverse-engineering-skill. The project has 62 stars and 7 forks, indicating an active community.
android-reverse-engineering-skill is released under the Apache-2.0 license, making it free to use and modify according to the license terms.