The apktool MCP server provides AI agents with tools to decompile, analyze, and rebuild Android APKs. It exposes apktool's functionality for reverse engineering, including resource extraction, smali code analysis, and APK repackaging. The server connects to the local apktool binary and integrates with Android SDK tools. Developers use it for security research, malware analysis, and Android app customization.
The apktool MCP server provides AI agents with tools to decompile, analyze, and rebuild Android APKs. It exposes apktool's functionality for reverse engineering, including resource extraction, smali code analysis, and APK repackaging. The server connects to the local apktool binary and integrates with Android SDK tools. Developers use it for security research, malware analysis, and Android app customization.
pip install apktool-mcp-serverAdd this configuration to your claude_desktop_config.json:
{
"mcpServers": {
"zinja-coder-apktool-mcp-server-github": {
"command": "uvx",
"args": [
"pip install apktool-mcp-server"
]
}
}
}Restart Claude Desktop, then ask:
"What tools do you have available from apktool?"
No configuration required. This server works out of the box.
"What resources are available in apktool?"
Claude will query available resources and return a list of what you can access.
"Show me details about [specific item] in apktool"
Claude will fetch and display detailed information about the requested item.
"Create a new [item] in apktool with [details]"
Claude will use the appropriate tool to create the resource and confirm success.
See what tools in your stack can connect to AI.
We build custom MCP integrations for B2B companies. From simple connections to complex multi-tool setups.