Skip to main content

MCP server exposing Android security research tools for authorised penetration testing

Project description

mobile-security-mcp

Legitimate penetration testing toolkit — for use only on applications you are authorised to test.

An MCP (Model Context Protocol) server that effortlessly transforms any AI agent (Claude Code, Cline, Goose, OpenCode) into an elite Android security researcher by providing them direct access to the industry's most powerful reverse-engineering stack.

✨ Zero-Touch Automation

This MCP server features Zero-Touch automated configuration. It comes equipped with native Python downloaders that securely fetch, extract, and configure all the massive reverse-engineering binaries directly into ~/tools/—injecting them dynamically into your environment without forcing you to manually run brew, apt, or choco commands.

Just run the setup command, and it builds the entire penetration testing environment out of thin air:

# 1. Install via pip
pip install mobile-security-mcp

# 2. Run the Zero-Touch Setup (installs apktool, jadx, adb, frida, etc.)
python -m mobile_security_mcp --setup

🛠️ The Arsenal (Tools for Agents)

When an AI Agent connects to this server, they gain autonomous execution capability over the following tools:

Static Analysis & Reversing

  • apk_decompile: Unpacks APK via apktool (Smali).
  • apk_decompile_java: Hardware-accelerated source code extraction via jadx.
  • apk_identify: Uses apkid to fingerprint packers, obfuscators, and SDKs.
  • apk_scan_secrets: Scans the codebase for high-entropy secrets and keys.
  • search_strings: Ultra-fast regex string hunting over decompiled code.

Dynamic Instrumentation (Frida)

  • frida_spawn: Spawns an app with early-instrumentation capabilities.
  • frida_attach: Attaches to a running application process.
  • frida_inject: Pushes raw JS or executes library bypass scripts live in memory.
  • objection_run: High-level commands to explore application memory, classes, and SSL.

RASP & Anti-Tamper Bypass

  • rasp_identify: Identifies active enterprise app protections (Zimperium, DexGuard, Promon, Arxan).
  • rasp_bypass: Dynamically generates targeted Frida bypass scripts for root detection, SSL pinning, and emulator checks.

Cross-Platform Scaffolding

  • hermes_decode: Extracts and decompiles React Native .hbc bundles to raw JSX.
  • flutter_blutter: Scaffolds Flutter engine un-stripping and dart-compile recovery.

Device Control & Visuals

  • adb_shell / adb_pull / adb_push: Direct device bridging.
  • scrcpy_start: Starts a background hardware-accelerated screen mirror.
  • scrcpy_screenshot: Takes a pristine UI screenshot so the Agent can visually understand the app state.

Manipulation & Signing

  • apk_sign: Zipsigner & uber-apk-signer automation.
  • apk_rebuild_sign: Re-compiles a modified Smali directory and re-signs it for immediate device installation.

🧠 Master Agent Workflow

This server ships with a massive built-in knowledge-base (master-agent-workflow) that AI agents read when they boots up. It enforces strict, logical reverse engineering methodologies, forcing agents to:

  1. Start with static mapping instead of blind dynamic analysis.
  2. Establish "Memory Profiles" using memory_write to keep persistent states over long sessions.
  3. Consult built-in escalation playbooks (bypass-ssl, bypass-root) if they get stuck.

🚀 Installation & Agent Integration

Claude Code

// .claude/mcp.json
{
  "mcpServers": {
    "mobile-security": {
      "command": "python",
      "args": ["-m", "mobile_security_mcp"]
    }
  }
}

Cline (VSCode)

"cline.mcpServers": {
  "mobile-security": {
    "command": "python",
    "args": ["-m", "mobile_security_mcp"]
  }
}

🤝 Contributing & Requesting Tools

We want to build the ultimate open-source, AI-driven Mobile Security framework. We welcome forks, pull requests, and community-driven knowledge!

Visit the Repository: github.com/mobile-security-mcp/mobile-security-mcp (Replace with actual repository link)

Have a tool suggestion?

If you maintain a fork or just love a specific open-source tool (like MobSF, RMS, Medusa, etc.), please open an issue at the link above! We are actively looking to add new handlers for:

  • iOS decryption and LLDB bridging.
  • Advanced unpacking tools.
  • Web3 / Wallet security analyzers.

Feel free to fork the repo, create a new handler in mobile_security_mcp/handlers/, and submit a Pull Request!


Disclaimer: This tool is for educational and authorized penetration testing purposes only. You are solely responsible for ensuring you have explicit written permission before testing any application.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mobile_security_mcp-0.1.4.tar.gz (64.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mobile_security_mcp-0.1.4-py3-none-any.whl (77.2 kB view details)

Uploaded Python 3

File details

Details for the file mobile_security_mcp-0.1.4.tar.gz.

File metadata

  • Download URL: mobile_security_mcp-0.1.4.tar.gz
  • Upload date:
  • Size: 64.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for mobile_security_mcp-0.1.4.tar.gz
Algorithm Hash digest
SHA256 bb86e104ad830cf320d6eafd3841b34db4c2ee36410633139a5a0d1ca2ba9d63
MD5 9356f22b404855b9ad410aed945600ec
BLAKE2b-256 a6e6fb9f084dd1a70cd42943c4ff5db87c24404348f35a120136a10f8619dc17

See more details on using hashes here.

File details

Details for the file mobile_security_mcp-0.1.4-py3-none-any.whl.

File metadata

File hashes

Hashes for mobile_security_mcp-0.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 f9bfe6ed890e9195619b695553f6e63d17f3044dfb623f12529a2fcfdba876cf
MD5 79a63c90723c46a1323333e46f429519
BLAKE2b-256 5794679534f72079dc50859a752a31fb841c153b092f7cdb56b11a752c3e659b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page