
APKTool MCP Server
Supports UIby zinja-coder
Automated Android APK analysis and reverse engineering for LLMs, powered by APKTool.
What it does
This MCP server integrates the powerful APKTool utility directly into LLMs like Claude, enabling automated Android APK decompilation, manifest parsing, and smali code analysis. It allows AI to perform real-time reverse engineering, uncover vulnerabilities, and modify APK components without leaving the chat interface.
Tools
decode_apk: Decompiles an APK file into a project folder.get_manifest: Extracts the AndroidManifest.xml for permission and component analysis.get_smali_file: Retrieves specific smali code for logic review.modify_smali_file: Patches smali files to alter app behavior.build_apk: Reassembles a decoded project back into an installable APK.search_in_file: Performs pattern searches across the decoded project.list_resources: Explores app resources and layouts.
Installation
Prerequisites
Install APKTool globally from apktool.org.
Claude Desktop
Add the following to your claude_desktop_config.json:
{
"mcpServers": {
"apktool-mcp-server": {
"command": "uv",
"args": [
"--directory",
"/PATH/TO/apktool-mcp-server/",
"run",
"apktool_mcp_server.py"
]
}
}
}
Supported hosts
- Claude Desktop
Quick install
uv --directory /PATH/TO/apktool-mcp-server/ run apktool_mcp_server.pyInformation
- Pricing
- free
- Published





