jadx-mcp-server and apktool-mcp-server
These are complementary tools for Android reverse engineering: JADX-MCP decompiles APK files into readable Java source code, while APKTool-MCP extracts and repackages APK resources and bytecode, allowing developers to inspect both the application logic and assets during analysis.
About jadx-mcp-server
zinja-coder/jadx-mcp-server
MCP server for JADX-AI Plugin
Implements a Python-based MCP server that bridges LLMs with JADX via HTTP requests to a plugin, exposing 20+ tools for live Android APK analysis including class/method extraction, manifest parsing, smali bytecode retrieval, and variable renaming. Communicates with the JADX-AI-MCP plugin using a request-handler architecture that queries the decompiled app context directly, enabling real-time vulnerability detection and code-aware LLM recommendations without context switches.
About apktool-mcp-server
zinja-coder/apktool-mcp-server
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
Wraps apktool with MCP to enable Claude and other LLMs to directly decompile APKs, parse manifests, modify smali code, and analyze resources through a unified interface. Exposes 13+ tools including decode, search, manifest inspection, and file modification via stdio transport. Integrates with Claude Desktop and Ollama-based workflows as part of a broader Android reverse-engineering suite.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work