dJEB
Integrates with JEB decompiler through a Python-Jython bridge to enable direct Android APK analysis, method decompila...
What it does
Integrates with JEB decompiler through a Python-Jython bridge to enable direct Android APK analysis, method decompilation, code element manipulation, cross-reference analysis, manifest extraction, and automated refactoring operations for reverse engineering and security assessment workflows.
Provides direct access to JEB decompiler functionality for Android APK analysis through a Python-Jython bridge architecture. Exposes tools for decompiling methods and classes, listing and renaming code elements, analyzing cross-references, retrieving manifest and resource files with grep filtering, and performing batch operations on DEX bytecode structures. Built with a socket-based server running inside JEB and a bridge client for Claude Desktop integration, it enables reverse engineering workflows including malware analysis, vulnerability research, and Android application security assessment by allowing natural language queries against decompiled code, resource extraction, and automated refactoring operations.
Capabilities
Server
Quality
deterministic score 0.59 from registry signals: · indexed on pulsemcp · has source repo · 18 github stars · registry-generated description present