jadx-mcp-server and apktool-mcp-server

These are complementary tools for Android reverse engineering: JADX-MCP decompiles APK files into readable Java source code, while APKTool-MCP extracts and repackages APK resources and bytecode, allowing developers to inspect both the application logic and assets during analysis.

jadx-mcp-server
55
Established
apktool-mcp-server
44
Emerging
Maintenance 10/25
Adoption 10/25
Maturity 15/25
Community 20/25
Maintenance 2/25
Adoption 10/25
Maturity 15/25
Community 17/25
Stars: 322
Forks: 53
Downloads:
Commits (30d): 0
Language: Python
License: Apache-2.0
Stars: 320
Forks: 41
Downloads:
Commits (30d): 0
Language: Python
License: Apache-2.0
No Package No Dependents
Stale 6m No Package No Dependents

About jadx-mcp-server

zinja-coder/jadx-mcp-server

MCP server for JADX-AI Plugin

Implements a Python-based MCP server that bridges LLMs with JADX via HTTP requests to a plugin, exposing 20+ tools for live Android APK analysis including class/method extraction, manifest parsing, smali bytecode retrieval, and variable renaming. Communicates with the JADX-AI-MCP plugin using a request-handler architecture that queries the decompiled app context directly, enabling real-time vulnerability detection and code-aware LLM recommendations without context switches.

About apktool-mcp-server

zinja-coder/apktool-mcp-server

A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)

Wraps apktool with MCP to enable Claude and other LLMs to directly decompile APKs, parse manifests, modify smali code, and analyze resources through a unified interface. Exposes 13+ tools including decode, search, manifest inspection, and file modification via stdio transport. Integrates with Claude Desktop and Ollama-based workflows as part of a broader Android reverse-engineering suite.

Scores updated daily from GitHub, PyPI, and npm data. How scores work