Android-MCP and apktool-mcp-server

These are complements: the first provides runtime interaction with live Android devices while the second enables static analysis and modification of APK files, addressing different phases of Android development and security workflows.

Android-MCP
74
Verified
apktool-mcp-server
44
Emerging
Maintenance 13/25
Adoption 17/25
Maturity 24/25
Community 20/25
Maintenance 2/25
Adoption 10/25
Maturity 15/25
Community 17/25
Stars: 447
Forks: 67
Downloads: 1,031
Commits (30d): 0
Language: Python
License: MIT
Stars: 320
Forks: 41
Downloads: —
Commits (30d): 0
Language: Python
License: Apache-2.0
No risk flags
Stale 6m No Package No Dependents

About Android-MCP

CursorTouch/Android-MCP

MCP Server for interacting with Android Devices.

Implements an MCP server that bridges LLM agents to Android devices via ADB and the Accessibility API, enabling app navigation, UI interaction, and automated testing without computer vision models. Exposes a rich toolset including gesture controls (tap, swipe, drag), text input, view hierarchy inspection, and shell command execution—with typical action latency of 2-4 seconds. Integrates directly with Claude Desktop and any LLM/VLM, supporting Android 10+ devices and emulators.

About apktool-mcp-server

zinja-coder/apktool-mcp-server

A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)

Wraps apktool with MCP to enable Claude and other LLMs to directly decompile APKs, parse manifests, modify smali code, and analyze resources through a unified interface. Exposes 13+ tools including decode, search, manifest inspection, and file modification via stdio transport. Integrates with Claude Desktop and Ollama-based workflows as part of a broader Android reverse-engineering suite.

Scores updated daily from GitHub, PyPI, and npm data. How scores work