zinja-coder/apktool-mcp-server

A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)

44
/ 100
Emerging

This tool helps Android security researchers and reverse engineers analyze Android Package Kits (APKs) for vulnerabilities, debug issues, or understand app behavior. It takes an APK file as input and, with the help of Large Language Models (LLMs) like Claude, provides intelligent recommendations, code analysis, and modifications. This allows users to efficiently identify security risks, reverse engineer code, and solve capture-the-flag (CTF) challenges.

320 stars. No commits in the last 6 months.

Use this if you need to quickly and intelligently decompile, analyze, and modify Android APKs with AI assistance, especially for security auditing or reverse engineering.

Not ideal if you are looking for a simple APK installer or a basic decompilation tool without the need for AI-driven analysis and interactive modifications.

android-reverse-engineering mobile-security vulnerability-analysis malware-analysis ctf-solving
Stale 6m No Package No Dependents
Maintenance 2 / 25
Adoption 10 / 25
Maturity 15 / 25
Community 17 / 25

How are scores calculated?

Stars

320

Forks

41

Language

Python

License

Apache-2.0

Last pushed

Sep 12, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/zinja-coder/apktool-mcp-server"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.