jadx-mcp-server and apktool-mcp-server
These are complementary tools for Android reverse engineering: JADX-MCP decompiles APK files into readable Java source code, while APKTool-MCP extracts and repackages APK resources and bytecode, allowing developers to inspect both the application logic and assets during analysis.
About jadx-mcp-server
zinja-coder/jadx-mcp-server
MCP server for JADX-AI Plugin
This project helps security researchers and reverse engineers automatically analyze Android APKs for vulnerabilities and understand their inner workings. You provide an Android Package Kit (APK) file, and it uses large language models (LLMs) to output insights into the code, potential security flaws, and parsed manifest details. It's designed for professionals who need to quickly decompile and inspect Android applications.
About apktool-mcp-server
zinja-coder/apktool-mcp-server
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
This tool helps Android security researchers and reverse engineers analyze Android Package Kits (APKs) for vulnerabilities, debug issues, or understand app behavior. It takes an APK file as input and, with the help of Large Language Models (LLMs) like Claude, provides intelligent recommendations, code analysis, and modifications. This allows users to efficiently identify security risks, reverse engineer code, and solve capture-the-flag (CTF) challenges.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work