Integrations
Provides reverse engineering capabilities for Android APK files, allowing analysis of decompiled code, detection of vulnerabilities, and inspection of app components
Integrates with GitHub for distribution, releases, and contribution management for both the JADX-AI-MCP plugin and server components
Offers support for analyzing ReactNative applications through hermes code examination capabilities
JADX-MCP-SERVER (Part of Zin's Reverse Engineering MCP Suite)
⚡ Fully automated MCP server built to communicate with JADX-AI-MCP Plugin to analyze Android APKs using LLMs like Claude — uncover vulnerabilities, parse manifests, and reverse engineer effortlessly.
Download now: https://github.com/zinja-coder/jadx-ai-mcp/releases
🤖 What is JADX-MCP-SERVER?
JADX MCP Server is a standalone Python server that interacts with a modified version of jadx-gui
(see: jadx-ai-mcp) via MCP (Model Context Protocol). It lets LLMs communicate with the decompiled Android app context live.
🤖 What is JADX-AI-MCP?
JADX-AI-MCP is a plugin for the JADX decompiler that integrates directly with Model Context Protocol (MCP) to provide live reverse engineering support with LLMs like Claude.
Think: "Decompile → Context-Aware Code Review → AI Recommendations" — all in real time.
Watch the demo!
https://github.com/user-attachments/assets/b65c3041-fde3-4803-8d99-45ca77dbe30a
https://github.com/user-attachments/assets/c184afae-3713-4bc0-a1d0-546c1f4eb57f
https://github.com/user-attachments/assets/6342ea0f-fa8f-44e6-9b3a-4ceb8919a5b0
It is combination of two tools:
- JADX-AI-MCP
- JADX MCP SERVER
Zin MCP Suie
Current MCP Tools
The following MCP tools are available:
fetch_current_class()
— Get the class name and full source of selected classget_selected_text()
— Get currently selected textget_all_classes()
— List all classes in the projectget_class_source()
— Get full source of a given classget_method_by_name()
— Fetch a method’s sourcesearch_method_by_name()
— Search method across classesget_methods_of_class()
— List methods in a classget_fields_of_class()
— List fields in a classget_smali_of_class()
— Fetch smali of classget_main_activity_class()
— Fetch main activity from jadx mentioned in AndroidManifest.xml file.get_main_application_classes_code()
— Fetch all the main application classes' code based on the package name defined in the AndroidManifest.xml.get_main_application_classes_names()
— Fetch all the main application classes' names based on the package name defined in the AndroidManifest.xml.get_android_manifest()
— Retrieve and return the AndroidManifest.xml content.get_strings()
: Fetches the strings.xml fileget_all_resource_file_names()
: Retrieve all resource files names that exists in applicationget_resource_file()
: Retrieve resource file content
Note: Tested on Claude Desktop. Support for other LLMs might be tested in future.
🗒️ Sample Prompts
🔍 Basic Code Understanding
🛡️ Vulnerability Detection
🛠️ Reverse Engineering Helpers
📦 Static Analysis
🤖 AI Code Modification
📄 Documentation & Metadata
🛠️ Getting Started
Running on Local LLM Using Ollama and Zin MCP Client - Recommended
⚡ Lightweight, Fast, Simple, CLI-Based MCP Client for STDIO MCP Servers, to fill the gap and provide bridge between your local LLMs running Ollama and MCP Servers.
Check Now: https://github.com/zinja-coder/zin-mcp-client
Demo: Perform Code Review to Find Vulnerabilities locally
https://github.com/user-attachments/assets/4cd26715-b5e6-4b4b-95e4-054de6789f42
🛣️ Future Roadmap
- Add Support for apktool
- Add support for hermes code (ReactNative Application)
- Add more useful MCP Tools
- Make LLM be able to modify code on JADX
- Add prompts templates, give llm access to Android APK Files as Resources
- Build MCP Client to support Local LLM
- END-GOAL : Make all android reverse engineering and APK modification tools Connect with single MCP server to make reverse engineering apk files as easy as possible purely from vibes.
NOTE For Contributors
- The files related to JADX-AI-MCP can be found here
- The files related to jadx-mcp-server can be found in this repository only.
🙏 Credits
This project is a plugin for JADX, an amazing open-source Android decompiler created and maintained by @skylot. All core decompilation logic belongs to them. I have only extended it to support my MCP server with AI capabilities.
The original README.md from jadx is included here in this repository for reference and credit.
This MCP server is made possible by the extensibility of JADX-GUI and the amazing Android reverse engineering community.
Also huge thanks to @aaddrick for developing Claude desktop for Debian based linux.
And in last thanks to @anthropics for developing the Model Context Protocol and @FastMCP team
And all opensource maintainers and contributors that makes libraries and dependencies which allows project like this possible.
Audited and Received Assessment Badge
Thank you Mseep.net for auditing and providing Assessment Badge.
📄 License
This plugin inherits the Apache 2.0 License from the original JADX repository.
⚖️ Legal Warning
Disclaimer
The tools jadx-ai-mcp
and jadx_mcp_server
are intended strictly for educational, research, and ethical security assessment purposes. They are provided "as-is" without any warranties, expressed or implied. Users are solely responsible for ensuring that their use of these tools complies with all applicable laws, regulations, and ethical guidelines.
By using jadx-ai-mcp
or jadx_mcp_server
, you agree to use them only in environments you are authorized to test, such as applications you own or have explicit permission to analyze. Any misuse of these tools for unauthorized reverse engineering, infringement of intellectual property rights, or malicious activity is strictly prohibited.
The developers of jadx-ai-mcp
and jadx_mcp_server
shall not be held liable for any damage, data loss, legal consequences, or other consequences resulting from the use or misuse of these tools. Users assume full responsibility for their actions and any impact caused by their usage.
Use responsibly. Respect intellectual property. Follow ethical hacking practices.
🙌 Contribute or Support
- Found it useful? Give it a ⭐️
- Got ideas? Open an issue or submit a PR
- Built something on top? DM me or mention me — I’ll add it to the README!
Built with ❤️ for the reverse engineering and AI communities.
This server cannot be installed
local-only server
The server can only run on the client's local machine because it depends on local resources.
A Model Context Protocol server that connects to a custom JADX fork (JADX-AI) and enables local LLMs to interact with decompiled Android app code for live reverse engineering assistance.
Related MCP Servers
- -securityAlicense-qualityA Model Context Protocol server that enables building Android projects and running tests directly in Visual Studio Code through extensions like Cline or Roo Code.Last updated -1PythonMIT License
- -securityAlicense-qualityA Model Context Protocol server that enables Large Language Models to interact with Binary Ninja for reverse engineering tasks like viewing assembly code, decompiled code, renaming functions, and adding comments.Last updated -PythonMIT License
- -securityFlicense-qualityA server that exposes the Jadx decompiler API over HTTP, enabling Claude to interact with decompiled Java/Android code to list classes, fetch source code, inspect methods/fields, and extract code live.Last updated -42
- AsecurityAlicenseAqualityA Model Context Protocol server that fetches up-to-date, version-specific documentation and code examples from libraries directly into LLM prompts, helping developers get accurate answers without outdated or hallucinated information.Last updated -286,4977,081JavaScriptMIT License