APktool-MCP

hamzalekranbi/APktool-MCP

3.3

If you are the rightful owner of APktool-MCP and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

Apktool MCP Server is a powerful tool for APK analysis and reverse engineering, integrating with Gemini CLI for AI-powered insights.

Apktool MCP Server: Advanced APK Analysis and Reverse Engineering

License: MIT Python 3.10+ MCP Compatible Gemini CLI

Welcome to the Apktool MCP Server. This powerful server exposes Apktool functionality for Android APK analysis and reverse engineering. It integrates seamlessly with Gemini CLI to provide AI-powered APK security analysis, privacy auditing, and reverse engineering guidance through natural language commands.

🚀 Features

🔍 Comprehensive APK Analysis

  • Decompile APKs: Extract resources, manifest, and smali code.
  • Analyze Permissions: Assess security by analyzing app components.
  • Extract String Resources: Gain insights into app functionality and behavior.

⚙️ Easy Integration with Gemini CLI

  • Utilize natural language commands to interact with the server.
  • Get real-time feedback and guidance for APK analysis tasks.

🔒 Security and Privacy Auditing

  • Perform detailed security assessments on APK files.
  • Identify potential privacy risks within applications.

🛠️ User-Friendly Interface

  • Simple command-line interface for quick access to features.
  • Clear output and error messages to assist users.

📦 Installation

To install the Apktool MCP Server, follow these steps:

  1. Clone the Repository:

    git clone https://github.com/hamzalekranbi/APktool-MCP.git
    cd APktool-MCP
    
  2. Install Dependencies: Ensure you have Python 3.10 or higher installed. Use pip to install the required packages:

    pip install -r requirements.txt
    
  3. Run the Server: Start the server using:

    python app.py
    
  4. Access the API: Open your browser and navigate to http://localhost:5000 to access the API documentation.

🔗 Download the Latest Release

To get the latest version of Apktool MCP, visit the Releases section. Download the necessary files and execute them as needed.

📚 Documentation

API Endpoints

  • POST /decompile: Decompile an APK file.
  • GET /permissions: Analyze permissions of a specified APK.
  • GET /strings: Extract string resources from an APK.

Example Usage

curl -X POST http://localhost:5000/decompile -F "file=@your_app.apk"

Response Format

The server responds with JSON objects containing the results of the requested actions. Here is an example response for decompiling an APK:

{
  "status": "success",
  "data": {
    "resources": "...",
    "manifest": "...",
    "smali": "..."
  }
}

🔧 Configuration

You can customize the server settings in the config.py file. Adjust parameters such as port number and logging options as needed.

📝 Contributing

We welcome contributions to improve the Apktool MCP Server. To contribute, follow these steps:

  1. Fork the repository.
  2. Create a new branch for your feature or bug fix.
  3. Make your changes and commit them.
  4. Push to your fork and submit a pull request.

📄 License

This project is licensed under the MIT License. See the file for details.

🌟 Acknowledgments

  • Apktool for providing the core APK decompilation functionality.
  • Gemini CLI for seamless integration with AI capabilities.

📬 Contact

For questions or feedback, feel free to reach out to the maintainers via GitHub issues or contact directly through email.

📥 Additional Resources

For more information on using Apktool and its features, check out the official Apktool Documentation.

To download the latest version of Apktool MCP, visit the Releases section. Download the necessary files and execute them as needed.