JADX plugin for LLM-powered Android APK analysis
Top 73.3% on sourcepulse
This project provides a JADX decompiler plugin and a companion Python server to enable live, context-aware reverse engineering of Android applications using Large Language Models (LLMs) like Claude. It targets Android security researchers and reverse engineers seeking to automate code analysis, vulnerability detection, and deobfuscation through AI assistance.
How It Works
The system comprises a JADX plugin (jadx-ai-mcp
) and a Python server (jadx-mcp-server
) that communicate via the Model Context Protocol (MCP). The JADX plugin exposes various functions to query the decompiled code (e.g., current class source, selected text, all classes) and sends this context to the MCP server. The server then relays this information to an LLM, allowing it to perform analysis, answer questions, and provide suggestions directly within the JADX GUI.
Quick Start & Requirements
jadx plugins --install "github:zinja-coder:jadx-ai-mcp"
or manual JAR installation.jadx-mcp-server-<version>.zip
, unzip, navigate to the directory, and use uv
for dependency management (uv venv
, source .venv/bin/activate
, uv pip install httpx fastmcp
).uv
package manager.jadx_mcp_server.py
script.Highlighted Details
Maintenance & Community
The project is actively maintained by zinja-coder. Issues and feature requests can be reported via GitHub issues. The project is built on top of JADX by @skylot.
Licensing & Compatibility
Inherits the Apache 2.0 License from the original JADX repository, allowing for commercial use and closed-source linking.
Limitations & Caveats
The project is primarily tested with Claude Desktop. Support for other AI models and clients is under development. The roadmap indicates features like LLM code modification are planned but not yet implemented.
4 days ago
Inactive