npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
Android malware distributed as APK files can be statically analyzed to extract permissions, activities, services, broadcast receivers, and suspicious API calls without executing the sample. This skill uses androguard for programmatic APK analysis, identifying dangerous permission combinations, obfuscated code patterns, dynamic code loading, reflection-based API calls, and network communication ...
Performs static analysis of Android APK malware using apktool, jadx, and androguard to detect permissions, manifest components, suspicious APIs, and network indicators.
Performs static analysis on Android APK malware using apktool for decompilation, jadx for Java source recovery, and androguard for permissions, manifest checks, suspicious APIs, and risk reports.
Reverse engineers Android APK malware using JADX to decompile Java/Kotlin code, identify data theft, C2 communication, privilege escalation, overlay attacks, and examine permissions/services.
Share bugs, ideas, or general feedback.
Android malware distributed as APK files can be statically analyzed to extract permissions, activities, services, broadcast receivers, and suspicious API calls without executing the sample. This skill uses androguard for programmatic APK analysis, identifying dangerous permission combinations, obfuscated code patterns, dynamic code loading, reflection-based API calls, and network communication indicators.
androguard