Found 8 repositories(showing 8)
SimoneAvogadro
Claude Code skill to support Android app's reverse engineering
Decompile Android APK, XAPK, AAB, DEX, JAR, and AAR files using jadx
CreditTone
No description available
The OWASP MSTG Android CrackMe is a series of Android applications with hidden flags designed to develop Java and Native reverse engineering skills.
ALsaeed323
Solutions for Allsafe Android Pentesting Challenges to enhance Android security skills. Includes guides for static/dynamic analysis, reverse engineering, and exploitation using adb, Frida, apktool, Medusa,Mobile Security Framework (MobSF),IDA Freeware, and Drozer. Each solution demonstrates identifying and exploiting app vulnerabilities efficien
Snitch-1302
Created a Capture-The-Flag Android app using Kotlin and the Android SDK to test mobile security skills. Included challenges like Base64 encoding, APK patching, Gzip analysis, and component exploitation. Focused on static analysis, reverse engineering, and mobile app hardening.
Public Codex port of Simone Avogadro's Claude Android reverse engineering skill
nitingaqiumodeluoye
Codex skill for locating JNI/native method addresses and offsets in Android reverse engineering. / 用于 Android 逆向中定位 JNI/native 方法地址与偏移的 Codex skill.
All 8 repositories loaded