apktool-mcp-server
A fully automated MCP server for analyzing Android APKs using LLMs like Claude.
The apktool-mcp-server is designed to provide live reverse engineering support by integrating with the Apk Tool and the Model Context Protocol (MCP). It allows users to decompile Android APKs, perform context-aware code reviews, and receive AI recommendations in real time. This tool is particularly useful for uncovering vulnerabilities and parsing manifests, making the reverse engineering process more efficient and accessible. As part of Zin's Reverse Engineering MCP Suite, this server aims to streamline the analysis of Android applications, enabling both novice and experienced developers to leverage AI capabilities for enhanced security assessments and code understanding. The project is still in its early stages, so users should be prepared for potential bugs and issues as development continues.
Compatible with
Install
Claude Desktop
Add to your claude_desktop_config.json:
{
"mcpServers": {
"apktool-mcp-server": {
"command": "npx",
"args": [
"-y",
"@modelcontextprotocol/server-apktool-mcp-server"
]
}
}
}Config File Location
Mac: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Linux: ~/.config/claude/claude_desktop_config.json
Some servers require additional setup - check the GitHub README for specific instructions.
Permissions