JADX MCP Server is a standalone Python application that communicates with JADX-AI-MCP Plugin, allowing LLMs to analyze, decompile, and reverse engineer Android apps in real-time, including vulnerability detection, manifest parsing, and code understanding.
JADX MCP Server is a standalone Python application that communicates with JADX-AI-MCP Plugin, allowing LLMs to analyze, decompile, and reverse engineer Android apps in real-time, including vulnerability detection, manifest parsing, and code understanding.
JADX MCP Server is designed to facilitate Android reverse engineering by interfacing with the JADX decompiler and AI models through the Model Context Protocol. It supports functions like class and method extraction, source code retrieval, vulnerability detection, and manifest analysis, providing developers and security researchers with a powerful tool for security assessment, code review, and compliance auditing of Android applications using AI assistance in a live environment.
Who will use JADX MCP Server?
Reverse engineers
Security researchers
Android developers
Penetration testers
Educational institutions
How to use the JADX MCP Server?
Step1: Clone the repository from GitHub
Step2: Install the required dependencies
Step3: Run the MCP server locally
Step4: Connect JADX-AI-MCP Plugin to the server
Step5: Use provided prompts or functions for analysis
JADX MCP Server's Core Features & Benefits
The Core Features
fetch_current_class()
get_selected_text()
get_all_classes()
get_class_source()
get_method_by_name()
search_method_by_name()
get_methods_of_class()
get_fields_of_class()
get_smali_of_class()
get_main_activity_class()
get_android_manifest()
The Benefits
Real-time Android app analysis
Supports AI-driven reverse engineering
Automates vulnerability detection
Facilitates detailed manifest parsing
Enhances security research and code comprehension
JADX MCP Server's Main Use Cases & Applications
Security vulnerability assessment of Android apps
Automated reverse engineering and code review
Educational purposes for Android architecture analysis
Research on app permissions and manifest structure
FAQs of JADX MCP Server
What is the primary function of the JADX MCP Server?
How do I set up the MCP server?
Is it compatible with all LLMs?
Can this tool detect vulnerabilities in APK files?