apktool-mcp-server
Сообществоот zinja-coder
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
Установка
# 0. Download and install apktoolОписание
<div align="center"> # apktool-mcp-server (Part of Zin's Reverse Engineering MCP Suite) ⚡ Fully automated MCP server built on top of apktool to analyze Android APKs using LLMs like Claude — uncover vulnerabilities, parse manifests, and reverse engineer effortlessly.      [](http://www.apache.org/licenses/LICENSE-2.0.html) </div> <!-- It is a still in early stage of development, so expects bugs, crashes and logical erros.--> <div align="center"> <img alt="banner" height="480px" widht="620px" src="https://github.com/user-attachments/assets/eb9037f2-d1c7-45e0-8871-ca8aaade0dd0"> </div> <!----> Image generated using AI tools. --- ## 🤖 What is apktool-mcp-server? **apktool-mcp-server** is a MCP server for the [Apk Tool](https://github.com/iBotPeaches/apktool) that integrates directly with [Model Context Protocol (MCP)](https://github.com/anthropic/mcp) to provide **live reverse engineering support with LLMs like Claude**. Think: "Decompile → Context-Aware Code Review → AI Recommendations" — all in real time. Watch the demo! https://github.com/user-attachments/assets/d50251b8-6b1c-4341-b18e-ae54eb24a847 - **Solving the CTFs** https://github.com/user-attachments/assets/c783a604-a636-4e70-9fa8-37e3d219b20b ## Other projects in Zin MCP Suite - **[JADX-AI-MCP](https://github.com/zinja-coder/jadx-ai-mcp)** - **[JADX-MCP-Server](https://github.com/zinja-coder/jadx-mcp-server)** - **[ZIN-MCP-Client](https://github.com/zinja-coder/zin-mcp-client)** ## Current MCP Tools The following MCP tools are available: - `build_apk()` — Build an APK from a decoded APKTool Project. - `get_manifest()` — Get the AndroidManifest.xml content from a decoded APK project. - `get_apktool_yml()` — Get apktool.yml information from a decoded APK project. - `list_smali_directories()` — List all smali directories in a project. - `list_smali_files()` — List smali files in a specific smali directory, optinally filtered by package prefix. - `get_smali_file()` — Get content of a specific smali file by class name. - `modify_smali_file()` — Modify the content of a specific smali file. - `list_resources()` — List resources in a project, optionally filtered by resource type. - `get_resource_file()` — Get Content of a specific resource file. - `modify_resource_file()` — Modify the content of a specific resource file. - `search_in_file()` — Search for a pattern in files with specified extensions. - `clean_project()` — Clean a project directory to prepare for rebuilding. - `decode_apk()` — Decode an APK file using APKTool, extracting resources and smali code. --- ## 🗒️ Sample Prompts ### 🔍 Basic Code Understanding - “List all smali directories for the dvac project.” - “Show me all the smali files under the package prefix com.vulnerable.component in the dvac project.” - “Get the smali code for the class com.vulnerable.component.MainActivity.” - “Compare MainActivity.smali with its previous version and show differences.” - “Search for usage of startActivity in smali files of dvac project.” ### 🛡️ Vulnerability Detection - “Analyze declared permissions in the dvac AndroidManifest.xml and flag dangerous ones.” - “Search for hardcoded URLs or IPs in all .xml and .smali files in the project.” - “Find all uses of PendingIntent.getActivity in smali files.” - “Check for exported activities or receivers in dvac’s AndroidManifest.xml.” - “List all smali files that access android.permission.SEND_SMS or READ_CONTACTS.” ### 🛠️ Reverse Engineering Helpers - “Decode this APK: dvac.apk and create a project called dvac.” - “Create a new APKTool project called test-harness.” - “Clean the dvac project before rebuild.” - “Extract DEX files from dvac project for external analysis.” - “Modify MainActivity.smali to insert a log line at the beginning of onCreate().” ### 📦 Static Analysis - “Get the complete AndroidManifest.xml from dvac project.” - “Show the contents of apktool.yml for the dvac project.” - “List all resource files of type layout.” - “Search for the word password in all resource and smali files.” - “Check which permissions are used and compare them against typical over-permissioning risks.” ### 🤖 AI Code Modification - “Modify the onCreate() method in MainActivity.smali to add a toast message.” - “Replace all http:// links with https:// in strings.xml.” - “Add the android:e
Отзывы (0)
Пока нет отзывов. Будьте первым!
Статистика
Информация
Технологии
Похожие серверы
mcp-chain-of-draft-server
Chain of Draft Server is a powerful AI-driven tool that helps developers make better decisions through systematic, iterative refinement of thoughts and designs. It integrates seamlessly with popular AI agents and provides a structured approach to reasoning, API design, architecture decisions, code reviews, and implementation planning.
mcp-use-ts
mcp-use is the framework for MCP with the best DX - Build AI agents, create MCP servers with UI widgets, and debug with built-in inspector. Includes client SDK, server SDK, React hooks, and powerful dev tools.
mesh
Define and compose secure MCPs in TypeScript. Generate AI workflows and agents with React + Tailwind UI. Deploy anywhere.
rhinomcp
RhinoMCP connects Rhino 3D to AI Agent through the Model Context Protocol (MCP)