MCP Catalogs
Homejebmcp screenshot

jebmcp

by flankerhqd·235·Score 49

MCP server enabling AI assistants to interact with JEB Pro reverse engineering tool for binary analysis.

developer-toolssecurityai-llm
47
Forks
1
Open issues
1 mo ago
Last commit
2d ago
Indexed

Overview

jebmcp is a Model Context Protocol server that provides AI assistants with programmatic access to JEB Pro, a professional reverse engineering tool. This server allows AI systems to decompile code, analyze methods, rename classes and methods, and perform other reverse engineering tasks through a MCP interface. It's particularly valuable for security researchers and analysts who want to leverage AI for automated vulnerability detection and code analysis in binary applications.

Try asking AI

After installing, here are 3 things you can ask your AI assistant:

you:Automated vulnerability detection in Android APK files using AI analysis
you:Code refactoring assistance with automated renaming of methods and classes
you:Reverse engineering support by providing AI-powered analysis of application structure

When to choose this

Choose jebmcp when you're working with JEB Pro for Android reverse engineering and want to leverage AI assistants for automated analysis, code exploration, and batch renaming tasks.

When NOT to choose this

Avoid if you're not using JEB Pro, or if you need reverse engineering capabilities for platforms other than Android applications.

Tools this server exposes

12 tools extracted from the README
  • ping

    Check the connection to the MCP server

  • check_connection

    Verify the connection status to the JEB MCP server

  • get_manifest

    Get the manifest information from the JEB decompiled application

  • get_all_exported_activities

    Retrieve all exported activities from the JEB decompiled application

  • get_exported_activities_count

    Count the number of exported activities in the JEB decompiled application

  • get_an_exported_activity_by_index

    Get a specific exported activity by its index from the JEB decompiled application

  • get_class_decompiled_code

    Get the decompiled code for a specific class in JEB

  • get_method_decompiled_code

    Get the decompiled code for a specific method in JEB

  • get_method_callers

    Get all callers of a specific method in JEB

  • get_method_overrides

    Get all methods overridden by a specific method in JEB

  • get_superclass

    Get the superclass of a specific class in JEB

  • get_interfaces

    Get all interfaces implemented by a specific class in JEB

Comparable tools

ida-pro-mcpghidra-mcpbinnavi-mcp

Installation

Installation

Requirements

  • Python >= 3.11
  • uv: https://docs.astral.sh/uv/getting-started/installation/

Steps

  1. Copy the src/jeb_mcp/MCP.py to $JEB_INSTALLATION_DIR/scripts
  2. Start the script in JEB GUI (File->Scripts->Scripts selector...)
  3. Add the MCP server configuration in your client (e.g., Cline, Cursor)

Example configuration:

{
  "mcpServers": {
    "jeb": {
      "command": "uv",
      "args": ["--directory", "jeb-mcp/src/jeb_mcp", "run", "server.py"],
      "timeout": 1800,
      "disabled": false
    }
  }
}

Compare jebmcp with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.