Android-MCP and apktool-mcp-server
These are complements: the first provides runtime interaction with live Android devices while the second enables static analysis and modification of APK files, addressing different phases of Android development and security workflows.
About Android-MCP
CursorTouch/Android-MCP
MCP Server for interacting with Android Devices.
Implements an MCP server that bridges LLM agents to Android devices via ADB and the Accessibility API, enabling app navigation, UI interaction, and automated testing without computer vision models. Exposes a rich toolset including gesture controls (tap, swipe, drag), text input, view hierarchy inspection, and shell command execution—with typical action latency of 2-4 seconds. Integrates directly with Claude Desktop and any LLM/VLM, supporting Android 10+ devices and emulators.
About apktool-mcp-server
zinja-coder/apktool-mcp-server
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
Wraps apktool with MCP to enable Claude and other LLMs to directly decompile APKs, parse manifests, modify smali code, and analyze resources through a unified interface. Exposes 13+ tools including decode, search, manifest inspection, and file modification via stdio transport. Integrates with Claude Desktop and Ollama-based workflows as part of a broader Android reverse-engineering suite.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work