Qtty/jadx-mcp-server

A Pure-Java MCP Server for JaDX Android Reverse Engineering Tool

29
/ 100
Experimental

This project provides a specialized server that lets AI assistants analyze Android application packages (APKs). It takes an APK file as input and can decompile its code, extract components, and analyze its manifest and resources. Security researchers, Android developers, and analysts use this to understand how Android apps are built and to identify potential security vulnerabilities.

No commits in the last 6 months.

Use this if you need an AI assistant like Claude to automatically decompile and inspect Android APK files for security analysis, code review, or reverse engineering.

Not ideal if you are looking for a standalone graphical user interface (GUI) tool for manual APK analysis or if you don't use AI assistants that integrate with the Model Context Protocol (MCP).

Android-security mobile-app-analysis reverse-engineering vulnerability-assessment malware-analysis
No License Stale 6m No Package No Dependents
Maintenance 2 / 25
Adoption 5 / 25
Maturity 7 / 25
Community 15 / 25

How are scores calculated?

Stars

14

Forks

4

Language

Java

License

Last pushed

Aug 25, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/Qtty/jadx-mcp-server"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.