by zinja-coder
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
# Add to your Claude Code skills
git clone https://github.com/zinja-coder/apktool-mcp-server⚡ Fully automated MCP server built on top of apktool to analyze Android APKs using LLMs like Claude — uncover vulnerabilities, parse manifests, and reverse engineer effortlessly.
</div> <!-- It is a still in early stage of development, so expects bugs, crashes and logical erros.--> <div align="center"> <img alt="banner" height="480px" widht="620px" src="https://github.com/user-attachments/assets/eb9037f2-d1c7-45e0-8871-ca8aaade0dd0"> </div> <!---->Image generated using AI tools.
apktool-mcp-server is a MCP server for the Apk Tool that integrates directly with Model Context Protocol (MCP) to provide live reverse engineering support with LLMs like Claude.
Think: "Decompile → Context-Aware Code Review → AI Recommendations" — all in real time.
Watch the demo!
https://github.com/user-attachments/assets/d50251b8-6b1c-4341-b18e-ae54eb24a847
https://github.com/user-attachments/assets/c783a604-a636-4e70-9fa8-37e3d219b20b
The following MCP tools are available:
build_apk() — Build an APK from a decoded APKTool Project.get_manifest() — Get the AndroidManifest.xml content from a decoded APK project.get_apktool_yml() — Get apktool.yml information from a decoded APK project.list_smali_directories() — List all smali directories in a project.list_smali_files() — List smali files in a specific smali directory, optinally filtered by package prefix.get_smali_file() — Get content of a specific smali file by class name.modify_smali_file() — Modify the content of a specific smali file.list_resources() — List resources in a project, optionally filtered by resource type.get_resource_file() — Get Content of a specific resource file.modify_resource_file() — Modify the content of a specific resource file.search_in_file() — ...