Jadx icon

Jadx

2

Provides comprehensive Android APK reverse engineering and security assessment capabilities for AI assistants through a Pure-Java MCP server.

概要

Leveraging the powerful JADX decompiler, this Pure-Java Model Context Protocol (MCP) server enables AI assistants like Claude to conduct deep analysis of Android APK files. It facilitates comprehensive reverse engineering tasks, including decompiling code, inspecting classes and methods, extracting application components, and parsing the AndroidManifest.xml. Designed for security researchers and developers, it supports detailed security assessments, malware analysis, and code reviews, providing access to decompiled Java source, Smali bytecode, and resource files without external dependencies, ensuring cross-platform compatibility and ease of deployment.

主な機能

  • APK Loading & Analysis for detailed inspection
  • 0 GitHub stars
  • Code Decompilation from DEX bytecode to Java source
  • Component Extraction from AndroidManifest.xml
  • Manifest and Resource File Analysis
  • Bytecode Analysis (Smali) for low-level insights

ユースケース

  • Performing vulnerability assessments on Android applications
  • Conducting malware analysis and security auditing of APKs
  • Programmatically reverse engineering Android applications for security research
Advertisement

Advertisement