Android-MCP and jadx-mcp-server

These are complements: JADX-MCP provides static analysis and decompilation of Android APKs, while CursorTouch-MCP enables runtime interaction with live Android devices, serving different stages of Android security research and development workflows.

Android-MCP
64
Established
jadx-mcp-server
56
Established
Maintenance 10/25
Adoption 10/25
Maturity 24/25
Community 20/25
Maintenance 10/25
Adoption 10/25
Maturity 16/25
Community 20/25
Stars: 447
Forks: 67
Downloads:
Commits (30d): 0
Language: Python
License: MIT
Stars: 322
Forks: 53
Downloads:
Commits (30d): 0
Language: Python
License: Apache-2.0
No risk flags
No Package No Dependents

About Android-MCP

CursorTouch/Android-MCP

MCP Server for interacting with Android Devices.

This tool helps quality assurance engineers, mobile app testers, and anyone needing to automate Android device interactions. It takes natural language commands and translates them into actions like app navigation, UI taps, text input, and gesture controls on Android 10+ devices. The result is automated testing, task execution, and UI interaction without manual effort or complex coding.

mobile-app-testing quality-assurance android-automation user-interface-interaction AI-agent-orchestration

About jadx-mcp-server

zinja-coder/jadx-mcp-server

MCP server for JADX-AI Plugin

This project helps security researchers and reverse engineers automatically analyze Android APKs for vulnerabilities and understand their inner workings. You provide an Android Package Kit (APK) file, and it uses large language models (LLMs) to output insights into the code, potential security flaws, and parsed manifest details. It's designed for professionals who need to quickly decompile and inspect Android applications.

Android reverse engineering mobile security vulnerability analysis malware analysis app analysis

Scores updated daily from GitHub, PyPI, and npm data. How scores work