Android-MCP and apktool-mcp-server

These are complements: the first provides runtime interaction with live Android devices while the second enables static analysis and modification of APK files, addressing different phases of Android development and security workflows.

Android-MCP
64
Established
apktool-mcp-server
44
Emerging
Maintenance 10/25
Adoption 10/25
Maturity 24/25
Community 20/25
Maintenance 2/25
Adoption 10/25
Maturity 15/25
Community 17/25
Stars: 447
Forks: 67
Downloads:
Commits (30d): 0
Language: Python
License: MIT
Stars: 320
Forks: 41
Downloads:
Commits (30d): 0
Language: Python
License: Apache-2.0
No risk flags
Stale 6m No Package No Dependents

About Android-MCP

CursorTouch/Android-MCP

MCP Server for interacting with Android Devices.

This tool helps quality assurance engineers, mobile app testers, and anyone needing to automate Android device interactions. It takes natural language commands and translates them into actions like app navigation, UI taps, text input, and gesture controls on Android 10+ devices. The result is automated testing, task execution, and UI interaction without manual effort or complex coding.

mobile-app-testing quality-assurance android-automation user-interface-interaction AI-agent-orchestration

About apktool-mcp-server

zinja-coder/apktool-mcp-server

A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)

This tool helps Android security researchers and reverse engineers analyze Android Package Kits (APKs) for vulnerabilities, debug issues, or understand app behavior. It takes an APK file as input and, with the help of Large Language Models (LLMs) like Claude, provides intelligent recommendations, code analysis, and modifications. This allows users to efficiently identify security risks, reverse engineer code, and solve capture-the-flag (CTF) challenges.

android-reverse-engineering mobile-security vulnerability-analysis malware-analysis ctf-solving

Scores updated daily from GitHub, PyPI, and npm data. How scores work