JADX MCP Server
Interface UIpar zinja-coder
Connect LLMs to JADX-GUI for real-time Android APK reverse engineering, vulnerability detection, and code analysis.
What it does
JADX MCP Server bridges LLMs with the JADX decompiler, allowing AI assistants to interact directly with decompiled Android app context. It enables developers and security researchers to perform live reverse engineering, uncover vulnerabilities, and parse manifests effortlessly through a conversational interface.
Tools
fetch_current_class: Retrieves the name and full source of the currently selected class.get_selected_text: Captures the text currently highlighted in the JADX-GUI.get_all_classes: Lists all classes available in the project.get_class_source: Fetches the full source code of a specified class.get_method_by_name: Retrieves the source of a specific method.search_method_by_name: Searches for a method across all classes.search_classes_by_keyword: Performs a keyword search within class source code.get_android_manifest: Returns the content of the AndroidManifest.xml file.xrefs_to_class: Finds all references to a specific class.xrefs_to_method: Locates all references to a specific method.rename_variable: Renames variables within a method for better readability.debug_get_stack_frames: Extracts stack frames from the JADX debugger.
Installation
Add the following to your claude_desktop_config.json:
{
"mcpServers": {
"jadx-mcp": {
"command": "uv",
"args": ["run", "jadx_mcp_server.py", "--http"]
}
}
}
Note: Requires the JADX-AI-MCP plugin installed in JADX-GUI.
Supported hosts
- Claude Desktop
Installation rapide
uv run jadx_mcp_server.py --httpInformations
- Tarification
- free
- Publié







