Facilitates live reverse engineering of Android applications by connecting JADX decompiler with local LLMs via Model Context Protocol (MCP).
Sponsored
JADX enables real-time interaction between the JADX decompiler and local Large Language Models (LLMs) for enhanced reverse engineering workflows. It consists of a standalone Python server that communicates with a modified JADX-GUI plugin (JADX-AI) using the Model Context Protocol (MCP), granting LLMs live access to the decompiled Android app context for tasks like code review, vulnerability detection, and static analysis.
主な機能
01Exposes currently selected class via HTTP
02MCP client interoperability via local loopback
03Beta support for real-time code review
04Provides several MCP tools for fetching code, methods, and class information
05Built-in Claude Desktop integration
0626 GitHub stars
ユースケース
01Static analysis of Android applications using LLMs
02Vulnerability detection in Android applications with AI assistance
03Context-aware code review of decompiled Android applications using LLMs