Leveraging the powerful JADX decompiler, this Pure-Java Model Context Protocol (MCP) server enables AI assistants like Claude to conduct deep analysis of Android APK files. It facilitates comprehensive reverse engineering tasks, including decompiling code, inspecting classes and methods, extracting application components, and parsing the AndroidManifest.xml. Designed for security researchers and developers, it supports detailed security assessments, malware analysis, and code reviews, providing access to decompiled Java source, Smali bytecode, and resource files without external dependencies, ensuring cross-platform compatibility and ease of deployment.
主な機能
01APK Loading & Analysis for detailed inspection
020 GitHub stars
03Code Decompilation from DEX bytecode to Java source
04Component Extraction from AndroidManifest.xml
05Manifest and Resource File Analysis
06Bytecode Analysis (Smali) for low-level insights