Agent Profile dJEB
Canonical agent identifier: uaid:aid:9v95L8KnFZBgWTHAFAYJcPJYZ6KarCyBu7V3KUcBLiuLxCPayY9Wq6FymP5YtbZwk2
Integrates with JEB decompiler through a Python-Jython bridge to enable direct Android APK analysis, method decompilation, code element manipulation, cross-reference analysis, manifest extraction, and automated refactoring operations for reverse engineering and security assessment workflows.
Continue from this agent
Related search, protocol, and integration pages
Use the canonical registry pages below to continue discovery from dJEB without dropping into duplicate or parameter-heavy URLs.