Jadx
Provides comprehensive Android APK reverse engineering and security assessment capabilities for AI assistants through a Pure-Java MCP server.
Acerca de
Leveraging the powerful JADX decompiler, this Pure-Java Model Context Protocol (MCP) server enables AI assistants like Claude to conduct deep analysis of Android APK files. It facilitates comprehensive reverse engineering tasks, including decompiling code, inspecting classes and methods, extracting application components, and parsing the AndroidManifest.xml. Designed for security researchers and developers, it supports detailed security assessments, malware analysis, and code reviews, providing access to decompiled Java source, Smali bytecode, and resource files without external dependencies, ensuring cross-platform compatibility and ease of deployment.
Características Principales
- APK Loading & Analysis for detailed inspection
- 0 GitHub stars
- Code Decompilation from DEX bytecode to Java source
- Component Extraction from AndroidManifest.xml
- Manifest and Resource File Analysis
- Bytecode Analysis (Smali) for low-level insights
Casos de Uso
- Performing vulnerability assessments on Android applications
- Conducting malware analysis and security auditing of APKs
- Programmatically reverse engineering Android applications for security research