apktool-mcp-server
by zinja-coder·★ 437·Score 52
A production-ready MCP server that enables Android APK analysis and reverse engineering with AI assistants.
Overview
The apktool-mcp-server is a sophisticated MCP implementation that integrates APK Tool with Model Context Protocol to enable real-time Android reverse engineering with AI assistants. It provides comprehensive tools for APK decompilation, manifest parsing, smali code analysis, and resource manipulation. The server is designed for security researchers, CTF participants, and mobile app developers who want to leverage AI for analyzing Android applications. The server is part of a larger MCP suite that includes tools for JADX integration and specialized clients. It demonstrates excellent engineering practices with clear documentation, multiple installation methods, and thoughtful integration with popular AI clients like Claude Desktop. The project is actively maintained with recent commits and addresses a specific niche in mobile security research through AI augmentation.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Choose this MCP server when you need to perform reverse engineering tasks on Android APKs using AI assistance, especially for vulnerability analysis and code modification workflows.
When NOT to choose this
Avoid if you need Java-level decompilation (consider jadx-mcp-server instead) or if you're working with non-Android applications.
Tools this server exposes
12 tools extracted from the READMEbuild_apkBuild an APK from a decoded APKTool Project
get_manifestGet the AndroidManifest.xml content from a decoded APK project
get_apktool_ymlGet apktool.yml information from a decoded APK project
list_smali_directoriesList all smali directories in a project
list_smali_filesList smali files in a specific smali directory, optionally filtered by package prefix
get_smali_fileGet content of a specific smali file by class name
modify_smali_fileModify the content of a specific smali file
list_resourcesList resources in a project, optionally filtered by resource type
get_resource_fileGet content of a specific resource file
modify_resource_fileModify the content of a specific resource file
search_in_fileSearch for a pattern in files with specified extensions
decode_apkDecode an APK file using APKTool, extracting resources and smali code
Comparable tools
Installation
Installation
- Install APK Tool: https://apktool.org/docs/install
- Download the latest release: https://github.com/zinja-coder/apktool-mcp-server/releases
- Extract the archive and navigate to the apktool-mcp-server directory
- Install dependencies using uv:
# Install uv if not already installed
curl -LsSf https://astral.sh/uv/install.sh | sh
# Set up environment (optional)
uv venv
source .venv/bin/activate
# Install dependencies
uv pip install httpx fastmcpClaude Desktop Configuration
Add this to your claude_desktop_config.json:
{
"mcpServers": {
"apktool-mcp-server": {
"command": "/path/to/uv",
"args": [
"--directory",
"/path/to/apktool-mcp-server/",
"run",
"apktool_mcp_server.py"
]
}
}
}FAQ
- What is the relationship between apktool-mcp-server and APK Tool?
- apktool-mcp-server is a MCP server that builds upon APK Tool, providing an AI-friendly interface to APK Tool's reverse engineering capabilities through the Model Context Protocol.
- Which AI clients are compatible with this MCP server?
- It's explicitly tested with Claude Desktop and works with Cherry Studio. The server also integrates well with Ollama and the Zin MCP Client for local LLM usage.
Compare apktool-mcp-server with
Last updated · Auto-generated from public README + GitHub signals.