search_in_files
Locate specific text patterns within designated file types in APKTool project directories. Streamlines Android app reverse engineering by targeting .smali and .xml files, with configurable result limits.
Instructions
Search for a pattern in files with specified extensions.
Args: project_dir: Path to the APKTool project directory search_pattern: Text pattern to search for file_extensions: List of file extensions to search in max_results: Maximum number of results to return
Returns: Dictionary with search results
Input Schema
Name | Required | Description | Default |
---|---|---|---|
file_extensions | No | ||
max_results | No | ||
project_dir | Yes | ||
search_pattern | Yes |
Input Schema (JSON Schema)
You must be authenticated.
Other Tools from Apktool MCP Server
- analyze_permissions
- build_apk
- check_apktool_version
- clean_project
- compare_smali_files
- create_project
- decode_apk
- delete_project
- extract_dex
- get_apktool_yml
- get_available_devices
- get_manifest
- get_resource_file
- get_smali_file
- install_apk
- list_packages
- list_resources
- list_smali_directories
- list_smali_files
- list_workspace_projects
- modify_resource_file
- modify_smali_file
- search_in_files
- sign_apk
Related Tools
- @zinja-coder/apktool-mcp-server
- @zinja-coder/apktool-mcp-server
- @zinja-coder/apktool-mcp-server
- @zinja-coder/apktool-mcp-server
- @zinja-coder/apktool-mcp-server
- @zinja-coder/apktool-mcp-server