DevelopmentPython

apktool-mcp-server

A fully automated MCP server for analyzing Android APKs using LLMs like Claude.

Free
N/A rating (0 reviews)0 installs350 GitHub stars
APKReverse EngineeringAI

The apktool-mcp-server is designed to provide live reverse engineering support by integrating with the Apk Tool and the Model Context Protocol (MCP). It allows users to decompile Android APKs, perform context-aware code reviews, and receive AI recommendations in real time. This tool is particularly useful for uncovering vulnerabilities and parsing manifests, making the reverse engineering process more efficient and accessible. As part of Zin's Reverse Engineering MCP Suite, this server aims to streamline the analysis of Android applications, enabling both novice and experienced developers to leverage AI capabilities for enhanced security assessments and code understanding. The project is still in its early stages, so users should be prepared for potential bugs and issues as development continues.

Compatible with

Claude DesktopCursor

Install

Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "apktool-mcp-server": {
      "command": "npx",
      "args": [
        "-y",
        "@modelcontextprotocol/server-apktool-mcp-server"
      ]
    }
  }
}

Config File Location

Mac: ~/Library/Application Support/Claude/claude_desktop_config.json

Windows: %APPDATA%\Claude\claude_desktop_config.json

Linux: ~/.config/claude/claude_desktop_config.json

Some servers require additional setup - check the GitHub README for specific instructions.

Permissions

ok0
ok1