apktool-mcp-server

apktool-mcp-server

3.6

If you are the rightful owner of apktool-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

apktool-mcp-server is a fully automated MCP server built on top of apktool to analyze Android APKs using LLMs like Claude, providing live reverse engineering support.

apktool-mcp-server is a Model Context Protocol (MCP) server designed to work with Apk Tool, integrating with LLMs such as Claude to facilitate real-time reverse engineering of Android APKs. It automates the process of decompiling APKs, performing context-aware code reviews, and generating AI-driven recommendations. The server is part of Zin's Reverse Engineering MCP Suite and is built to uncover vulnerabilities, parse manifests, and assist in reverse engineering tasks. It supports a range of MCP tools for building, decoding, and modifying APK projects, making it a powerful tool for developers and security researchers. The server is compatible with Python 3.10+ and uses uv for dependency management. It can be integrated with local LLMs using the Zin MCP Client and configured to work with Claude Desktop for enhanced AI capabilities.

Features

  • Automated APK analysis using LLMs for real-time reverse engineering.
  • Integration with Apk Tool for decompiling and modifying APKs.
  • Context-aware code review and AI recommendations.
  • Support for a wide range of MCP tools for APK project management.
  • Compatible with Python 3.10+ and uses uv for dependency management.

Tools

  1. build_apk

    Build an APK from a decoded APKTool Project.

  2. get_manifest

    Get the AndroidManifest.xml content from a decoded APK project.

  3. get_apktool_yml

    Get apktool.yml information from a decoded APK project.

  4. list_smali_directories

    List all smali directories in a project.

  5. list_smali_files

    List smali files in a specific smali directory, optionally filtered by package prefix.