apktool-mcp-server
MCP ServerFreeA MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
Capabilities14 decomposed
apk binary decoding with smali bytecode extraction
Medium confidenceWraps the APKTool CLI to decompress and decompile Android APK binaries into human-readable smali (Jasmin) bytecode, AndroidManifest.xml, and resource files. The server maintains a workspace directory structure where each decoded APK becomes a distinct project, enabling LLMs to analyze and modify Android application internals through structured file access patterns rather than binary inspection.
Exposes APKTool through MCP protocol with workspace-based project isolation, allowing LLMs to maintain multiple decoded APK contexts simultaneously and perform context-aware modifications without re-decoding. Uses STDIO transport for seamless integration with Claude Desktop and other MCP clients.
Provides LLM-native APK decoding vs manual APKTool CLI usage, eliminating context switching and enabling AI agents to reason about decompiled code directly within their reasoning loop.
smali bytecode file retrieval and analysis
Medium confidenceImplements directory enumeration and file content retrieval for smali source files within decoded APK projects, with optional package-level filtering to reduce context noise. The server scans the smali/ directory tree and returns file listings or individual file contents, enabling LLMs to navigate Android application structure and locate specific classes or methods for analysis.
Provides hierarchical smali directory enumeration with package-level filtering, allowing LLMs to progressively narrow scope from entire APK to specific packages to individual classes, reducing token consumption compared to dumping entire codebase.
More efficient than generic file system tools because it understands Android package structure and can filter by package prefix, vs tools that require manual directory traversal.
mcp tool schema exposure and capability discovery
Medium confidenceExposes all 13 MCP tools through the standard Model Context Protocol with JSON schema definitions, enabling MCP clients (Claude Desktop, Cherry Studio, Ollama) to discover available tools and understand their parameters. The server implements the MCP tools list and tool call handling endpoints, allowing AI clients to invoke APK operations through natural language requests.
Implements full MCP protocol compliance with schema exposure for all 13 tools, enabling seamless integration with any MCP-compatible client. Uses FastMCP framework for automatic schema generation and tool registration.
Provides standardized tool discovery vs custom API documentation, allowing any MCP client to automatically discover and invoke APK tools without manual integration.
workspace-based project isolation and multi-apk management
Medium confidenceMaintains a centralized workspace directory (apktool_mcp_server_workspace/) where each decoded APK becomes an isolated project subdirectory. The server manages project naming, isolation, and lifecycle, enabling concurrent analysis of multiple APKs without cross-contamination. Projects are identified by name and persist across server restarts.
Implements filesystem-based project isolation with persistent workspace, enabling LLM agents to maintain multiple APK analysis contexts across sessions. Projects are automatically organized by name in the workspace directory.
Provides persistent multi-project management vs stateless tools that require re-decoding APKs for each analysis session.
stdio-based mcp transport and client communication
Medium confidenceImplements the Model Context Protocol server using FastMCP framework with STDIO transport, enabling bidirectional JSON-RPC communication with MCP clients. The server reads tool invocation requests from stdin and writes responses to stdout, allowing integration with Claude Desktop, Cherry Studio, Ollama, and other MCP-compatible clients without network configuration.
Uses FastMCP framework for automatic MCP protocol implementation with STDIO transport, eliminating manual JSON-RPC handling and enabling zero-configuration integration with MCP clients. Supports Claude Desktop, Cherry Studio, and Ollama out-of-the-box.
Simpler than custom API servers because MCP protocol is standardized and FastMCP handles serialization, vs building custom REST APIs for each client.
smali directory enumeration with hierarchical structure discovery
Medium confidenceScans the smali/ directory tree of a decoded APK and returns hierarchical package structure with directory listings. The server maps Java package names to filesystem paths and provides directory enumeration at multiple levels, enabling LLMs to understand the APK's code organization and navigate to specific packages or classes.
Provides hierarchical package enumeration with optional filtering, allowing LLMs to progressively explore APK structure from top-level packages to specific classes. Complements list_smali_files by providing directory-level organization.
More efficient than generic directory listing because it understands Android package naming conventions and can filter by package prefix.
smali bytecode modification and in-place editing
Medium confidenceEnables atomic read-modify-write operations on smali source files within a decoded APK project. The server accepts file path and new content, validates the smali syntax (basic checks), and writes modifications back to disk. This allows LLMs to patch vulnerabilities, inject logging, or modify application behavior by editing bytecode directly without requiring full recompilation.
Provides direct smali file editing through MCP without requiring external IDE or build tools, enabling LLMs to propose and apply code patches in a single agent step. Uses atomic file writes to maintain consistency.
Faster than manual APKTool workflows because LLM can edit smali directly without decompile-edit-recompile cycles, vs traditional Android development which requires full IDE setup.
androidmanifest.xml extraction and inspection
Medium confidenceRetrieves the decoded AndroidManifest.xml file from a project, exposing the application's declared permissions, activities, services, broadcast receivers, and intent filters. The server parses the XML and returns it in human-readable format, enabling LLMs to understand the app's security model, entry points, and declared capabilities without binary inspection.
Extracts manifest as structured XML rather than binary format, allowing LLMs to reason about declared permissions and exported components directly. Integrates with other tools to cross-reference manifest declarations with actual implementation in smali code.
Provides manifest analysis without requiring APK binary parsing tools, vs generic APK inspection tools that return raw binary manifest data.
apktool configuration inspection and project metadata
Medium confidenceRetrieves the apktool.yml configuration file generated during APK decoding, which contains metadata about the APK (version, SDK targets, framework resources, build configuration). This YAML file documents how APKTool decompiled the APK and what frameworks were used, enabling LLMs to understand the build context and compatibility constraints.
Exposes APKTool's internal configuration as queryable metadata, allowing LLMs to understand build context and make informed decisions about compatibility before rebuilding. Unique to MCP-based APK tools.
Provides structured build metadata vs manual inspection of apktool.yml files, enabling LLM agents to reason about SDK versions and framework dependencies programmatically.
apk rebuilding from modified source
Medium confidenceInvokes APKTool to recompile a modified project directory back into a signed APK binary. The server coordinates the rebuild process, handles APKTool CLI execution, and returns the path to the rebuilt APK. This enables LLMs to apply code modifications and generate testable APK artifacts without manual build tool invocation.
Automates APK rebuilding through MCP, eliminating manual APKTool CLI invocation and enabling LLMs to complete full modify-rebuild cycles within a single agent session. Maintains workspace isolation for concurrent projects.
Faster than manual APKTool workflows because LLM can trigger rebuilds programmatically, vs developers manually running apktool build commands.
project workspace cleanup and preparation
Medium confidencePrepares a decoded APK project for rebuilding by cleaning intermediate files and build artifacts generated by APKTool. The server removes build caches and temporary files that may interfere with rebuilding, ensuring a clean state for subsequent build operations. This is typically called before build_apk to guarantee consistency.
Provides explicit project cleanup through MCP, enabling LLM agents to manage workspace state between operations. Integrated with build_apk to ensure clean rebuilds.
Eliminates manual file deletion and ensures consistent project state vs developers manually cleaning build artifacts.
android resource file retrieval and inspection
Medium confidenceEnumerates and retrieves Android resource files (strings.xml, colors.xml, layouts, drawables, etc.) from the res/ directory of a decoded APK. The server provides directory listing and file content access, enabling LLMs to analyze resource definitions, UI layouts, and string constants without binary inspection.
Provides structured resource enumeration with type filtering, allowing LLMs to navigate Android resource hierarchy and locate specific resource types. Complements smali analysis by exposing non-code assets.
More efficient than generic file system tools because it understands Android resource structure and can filter by resource type (strings, layouts, drawables, etc.).
android resource file modification and patching
Medium confidenceEnables modification of Android resource files (XML-based resources like strings.xml, layouts, colors.xml) within a decoded APK project. The server accepts file path and new content, writes modifications back to disk, and allows LLMs to patch configuration, UI layouts, or string constants without recompiling smali code.
Enables resource-level modifications alongside smali code patching, allowing LLMs to modify app behavior through both code and configuration changes. Unique to MCP-based APK tools that expose resource editing.
Faster than manual resource editing because LLM can modify XML directly without IDE setup, vs traditional Android development requiring Android Studio.
full-text pattern search across apk project
Medium confidenceImplements regex-based or literal string search across all files in a decoded APK project (smali code, resources, manifests). The server scans the project directory tree and returns matching file paths and line numbers, enabling LLMs to locate specific code patterns, hardcoded values, or configuration strings without manual file traversal.
Provides full-text search across entire APK project with line-number reporting, enabling LLMs to locate specific patterns without manual file enumeration. Supports both literal and regex search modes.
More efficient than manual grep-based workflows because search is integrated into MCP and returns structured results with context, vs developers manually running grep commands.
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with apktool-mcp-server, ranked by overlap. Discovered automatically through the match graph.
jadx-ai-mcp
Plugin for JADX to integrate MCP server
ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
mcp-security-hub
A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.
hexstrike-ai
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capa
ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
hexstrike-ai
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capa
Best For
- ✓security researchers performing Android VAPT assessments
- ✓mobile app developers debugging obfuscated third-party libraries
- ✓LLM agents automating APK analysis workflows
- ✓security auditors performing targeted code review of specific Android packages
- ✓LLM agents building codebase understanding before proposing modifications
- ✓developers reverse-engineering competitor apps to understand feature implementation
- ✓AI researchers building LLM agents for Android security analysis
- ✓developers integrating APK tools into MCP-compatible clients
Known Limitations
- ⚠Depends on external APKTool CLI binary — requires separate installation and PATH configuration
- ⚠Decoding time scales with APK size; large enterprise apps (100MB+) may take 30+ seconds
- ⚠Workspace directory can grow unbounded — no automatic cleanup of old decoded projects
- ⚠Cannot decode APKs with custom encryption or anti-tampering protections that bypass APKTool
- ⚠Package filtering is prefix-based string matching, not semantic package resolution — may return false positives
- ⚠No syntax highlighting or AST parsing — returns raw smali text without semantic structure
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
Repository Details
Last commit: Sep 12, 2025
About
A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
Categories
Alternatives to apktool-mcp-server
Are you the builder of apktool-mcp-server?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →