Claude Code skill to support Android app's reverse engineering
Copy the install, test the workflow, then decide if it earns a permanent slot.
Fresh repo activity plus visible builder pull. This is the kind of tool people test before it turns obvious.
Copy the install, test the workflow, then decide if it earns a permanent slot.
Not hard to test, not trivial to unwind. Worth trying if it closes a sharp gap.
GitHub health 42/100. no security policy. 5 open issues make this testable, but not something to trust blind.
AI Agent
Claude Code
Model
Multiple
Build Time
Hours
Fastest way to find out if android-reverse-engineering-skill belongs in your setup.
Copy the install command, run a real test, and back it out cleanly if it slows you down.
# Visit: https://github.com/SimoneAvogadro/android-reverse-engineering-skillRun this first. You will know quickly if the workflow earns a permanent slot.
# No automated removal — visit https://github.com/SimoneAvogadro/android-reverse-engineering-skillNo messy cleanup loop. If it misses, remove it and keep moving.
Install Location
~/ └─ .claude/ ├─ commands/ ├─ agents/ │ └─ android-reverse-engineering-skill/ ← installs here └─ settings.json
Claude Code skill to support Android app's reverse engineering. An open-source skill for the AI coding ecosystem.