kggzs

kggzs / ApkMCP-Auto

Public

本项目是一个 Android 逆向工程工具集合,通过 MCP (Model Context Protocol) 协议将 AI 助手(如 Claude)与专业的 Android 反编译工具连接起来,实现智能化的 APK 分析与修改。

18
5
100% credibility
Found Apr 10, 2026 at 18 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

A toolkit connecting AI assistants to Android app analysis tools for automated decompilation, debugging, signing, and security scanning.

How It Works

1
📱 Discover the app explorer

You hear about a friendly toolkit that lets AI helpers peek inside Android apps to understand what they do.

2
💾 Get the toolkit ready

Download the files and run a simple setup command to prepare all the exploring tools.

3
🤖 Link your AI companion

Create a special note that connects your smart AI friend to the toolkit's helpers.

4
🚀 Start the magic engines

Click to wake up all the analysis helpers, and watch them come alive instantly.

5
🔍 Feed it an app file

Tell your AI to examine a specific app file, and it automatically unpacks and scans everything inside.

6
📋 Review the discoveries

Receive easy reports on permissions, hidden links, suspicious parts, and even ad networks or trackers.

🎉 Unlock app secrets safely

Now you fully understand the app's inner workings, ready to learn, modify, or secure it responsibly.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 18 to 18 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is ApkMCP-Auto?

ApkMCP-Auto is a Python toolkit that connects AI assistants like Claude to Android reverse engineering tools via the MCP protocol, enabling automated APK analysis and modification. Drop an APK, and it handles decompiling with JADX or APKTool, device control via ADB, dynamic hooking with Frida, signing, static scans, and diffs—all invocable through natural language prompts or CLI commands like `python apkmcp.py start apktool`. It generates portable configs for IDEs like Trae, turning manual reversing into AI-driven workflows for android mcp claude setups.

Why is it gaining traction?

It stands out by bundling a full android mcp server stack—decode, analyze, hook, sign—in one portable package with relative paths and one-command installs, skipping fragmented toolchains. Prompt templates for ad removal, network analysis, or shelling deliver structured reports fast, while MCP integration lets android mcp ai tools like Claude query live JADX views or Frida hooks. Developers dig the github mirror android vibe: clone, config, run in codespaces or locally.

Who should use this?

Android security researchers dissecting third-party APKs for vulnerabilities, pentesters automating dynamic analysis on rooted devices, or modders tweaking apps with AI guidance. Ideal for reverse engineers in android github actions build pipelines or using android mcp client app in Cursor/Trae for hands-free smali edits and manifest dives.

Verdict

Early days with 18 stars and 1.0% credibility score signal immaturity—no tests, limited adoption—but thorough docs and CLI make it dead simple to spin up an android mcp tool chain. Grab it if you're prototyping android mcp ai flows; skip for production reversing until it matures.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.