apktool-mcp-server
If you are the rightful owner of apktool-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
apktool-mcp-server is a fully automated MCP server built on top of apktool to analyze Android APKs using LLMs like Claude, providing live reverse engineering support.
apktool-mcp-server is a Model Context Protocol (MCP) server designed to work with Apk Tool, integrating with LLMs such as Claude to facilitate real-time reverse engineering of Android APKs. It automates the process of decompiling APKs, performing context-aware code reviews, and generating AI-driven recommendations. The server is part of Zin's Reverse Engineering MCP Suite and is built to uncover vulnerabilities, parse manifests, and assist in reverse engineering tasks. It supports a range of MCP tools for building, decoding, and modifying APK projects, making it a powerful tool for developers and security researchers. The server is compatible with Python 3.10+ and uses uv for dependency management. It can be integrated with local LLMs using the Zin MCP Client and configured to work with Claude Desktop for enhanced AI capabilities.
Features
- Automated APK analysis using LLMs for real-time reverse engineering.
- Integration with Apk Tool for decompiling and modifying APKs.
- Context-aware code review and AI recommendations.
- Support for a wide range of MCP tools for APK project management.
- Compatible with Python 3.10+ and uses uv for dependency management.
Tools
build_apk
Build an APK from a decoded APKTool Project.
get_manifest
Get the AndroidManifest.xml content from a decoded APK project.
get_apktool_yml
Get apktool.yml information from a decoded APK project.
list_smali_directories
List all smali directories in a project.
list_smali_files
List smali files in a specific smali directory, optionally filtered by package prefix.