Android-MCP and apktool-mcp-server
These are complements: the first provides runtime interaction with live Android devices while the second enables static analysis and modification of APK files, addressing different phases of Android development and security workflows.
About Android-MCP
CursorTouch/Android-MCP
MCP Server for interacting with Android Devices.
This tool helps quality assurance engineers, mobile app testers, and anyone needing to automate Android device interactions. It takes natural language commands and translates them into actions like app navigation, UI taps, text input, and gesture controls on Android 10+ devices. The result is automated testing, task execution, and UI interaction without manual effort or complex coding.
About apktool-mcp-server
zinja-coder/apktool-mcp-server
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
This tool helps Android security researchers and reverse engineers analyze Android Package Kits (APKs) for vulnerabilities, debug issues, or understand app behavior. It takes an APK file as input and, with the help of Large Language Models (LLMs) like Claude, provides intelligent recommendations, code analysis, and modifications. This allows users to efficiently identify security risks, reverse engineer code, and solve capture-the-flag (CTF) challenges.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work