npx claudepluginhub killvxk/cybersecurity-skills-zhThis skill uses the workspace's default tool permissions.
以 APK 文件形式分发的 Android 恶意软件可通过静态分析提取权限、Activity、Service、广播接收器和可疑 API 调用,无需执行样本。本技能使用 androguard 进行编程化 APK 分析,识别危险权限组合、混淆代码模式、动态代码加载、基于反射的 API 调用以及网络通信指标。
Performs static analysis of Android APK malware using apktool, jadx, and androguard to detect permissions, manifest components, suspicious APIs, and network indicators.
Performs static analysis of Android APK malware using apktool for decompilation, jadx for Java source recovery, and androguard for permissions, manifest, and suspicious API detection.
Reverse engineers Android malware APKs using JADX: analyzes decompiled Java/Kotlin code, Manifest permissions, Receivers/Services for data theft, C2 comms, overlays. For mobile threat analysis.
Share bugs, ideas, or general feedback.
以 APK 文件形式分发的 Android 恶意软件可通过静态分析提取权限、Activity、Service、广播接收器和可疑 API 调用,无需执行样本。本技能使用 androguard 进行编程化 APK 分析,识别危险权限组合、混淆代码模式、动态代码加载、基于反射的 API 调用以及网络通信指标。
androguard