MCP Catalogs
Home

jadx-mcp-server

by Qtty·23·Score 40

A pure-Java MCP server enabling AI assistants to analyze and decompile Android APK files using JADX.

securitydeveloper-toolsai-llm
4
Forks
1
Open issues
9 mo ago
Last commit
2d ago
Indexed

Overview

This MCP server provides a comprehensive set of tools for Android APK reverse engineering through the MCP protocol. It enables AI assistants to load APKs, decompile code to Java source, inspect classes and methods, extract Android manifest components, analyze resource files, and retrieve bytecode representations. The server is built entirely in Java with no external dependencies, making it highly portable and easy to deploy as a single JAR file. It's particularly useful for security researchers, developers, and analysts who need to programmatically analyze Android applications.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Security researchers analyzing Android malware for defensive purposes
you:Developers reviewing third-party SDKs before integration
you:Analysts performing vulnerability assessments on Android applications
you:What Java version is required?
you:Can this tool modify APK files?

When to choose this

Choose this MCP server when you need to integrate APK reverse engineering capabilities into AI workflows without installing additional system dependencies.

When NOT to choose this

Avoid this if you need real-time analysis, as JADX processing can be resource-intensive for large APKs, or if you require advanced static analysis beyond decompilation.

Tools this server exposes

12 tools extracted from the README
  • load_apk

    Load and analyze an APK file for inspection

  • get_all_classes

    Get a list of all classes in the loaded APK

  • get_class_source

    Get decompiled source code of a specific class

  • get_methods_of_class

    Get list of methods in a specific class

  • get_fields_of_class

    Get list of fields in a specific class

  • get_method_by_name

    Get source code of a specific method

  • search_method_by_name

    Search for methods across all classes by name

  • get_exported_components

    Get exported components from AndroidManifest.xml

  • get_android_manifest

    Get the AndroidManifest.xml content

  • get_main_activity_class

    Get the main launcher activity class

  • get_all_resource_file_names

    Get list of all resource file names in the APK

  • get_resource_file

    Get content of a specific resource file

Comparable tools

androguard-mcpapktool-mcpdex-parser-apishell-mcp-with-jadx-climalware-analysis-cli-tools

Installation

Installation

  1. Clone the repository
git clone <repository-url>
cd jadx-mcp-server
  1. Build the project
chmod +x build.sh
./build.sh

Or build with Maven:

mvn clean package
  1. Configure Claude Desktop

Add to your claude_desktop_config.json:

{
  "mcpServers": {
    "jadx-analyzer": {
      "command": "java",
      "args": [
        "-Dspring.ai.mcp.server.stdio=true",
        "-jar",
        "/path/to/jadx-mcp-server/target/jadx-mcp-server-1.0.0.jar"
      ]
    }
  }
}

FAQ

What Java version is required?
Java 11 or higher is required to run this MCP server.
Can this tool modify APK files?
No, this tool is designed for read-only analysis and reverse engineering purposes only, not for modifying APK files.

Compare jadx-mcp-server with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.