A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
{
"mcpServers": {
"apktool-mcp-server": {
"args": [
"--directory",
"</PATH/TO/>apktool-mcp-server/",
"run",
"apktool_mcp_server.py"
],
"command": "/<path>/<to>/uv"
}
}
}A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)
Is it safe?
No known CVEs for httpx. 1 previously resolved.
No authentication — any process on your machine can connect.
Apache-2.0. View license →
Is it maintained?
Last commit 203 days ago. 351 stars.
Will it work with my client?
Transport: stdio, sse, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Context cost
13 tools. ~600 tokens (0.3% of 200K).
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
uvx httpx 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
build_apkBuild an APK from a decoded APKTool Project.
get_manifestGet the AndroidManifest.xml content from a decoded APK project.
get_apktool_ymlGet apktool.yml information from a decoded APK project.
list_smali_directoriesList all smali directories in a project.
list_smali_filesList smali files in a specific smali directory, optionally filtered by package prefix.
get_smali_fileGet content of a specific smali file by class name.
modify_smali_fileModify the content of a specific smali file.
list_resourcesList resources in a project, optionally filtered by resource type.
get_resource_fileGet content of a specific resource file.
modify_resource_fileModify the content of a specific resource file.
This server is missing a description.If you've used it, help the community.
Add informationLast scanned 7h ago
No open vulnerabilities. 1 fixed CVE.
CVE-2021-41945FixedPYSEC-2022-183
Encode OSS httpx <=1.0.0.beta0 is affected by improper input validation in `httpx.URL`, `httpx.Client` and some functions using `httpx.URL.copy_with`.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.