MCP server exposing Android security research tools for authorised penetration testing
Project description
mobile-security-mcp
Legitimate penetration testing toolkit — for use only on applications you are authorised to test.
An MCP (Model Context Protocol) server that effortlessly transforms any AI agent (Claude Code, Cline, Goose, OpenCode) into an elite Android security researcher by providing them direct access to the industry's most powerful reverse-engineering stack.
✨ Zero-Touch Automation
This MCP server features Zero-Touch automated configuration. It comes equipped with native Python downloaders that securely fetch, extract, and configure all the massive reverse-engineering binaries directly into ~/tools/—injecting them dynamically into your environment without forcing you to manually run brew, apt, or choco commands.
Just run the setup command, and it builds the entire penetration testing environment out of thin air:
# 1. Install via pip
pip install mobile-security-mcp
# 2. Run the Zero-Touch Setup (installs apktool, jadx, adb, frida, etc.)
python -m mobile_security_mcp --setup
🛠️ The Arsenal (Tools for Agents)
When an AI Agent connects to this server, they gain autonomous execution capability over the following tools:
Static Analysis & Reversing
apk_decompile: Unpacks APK viaapktool(Smali).apk_decompile_java: Hardware-accelerated source code extraction viajadx.apk_identify: Usesapkidto fingerprint packers, obfuscators, and SDKs.apk_scan_secrets: Scans the codebase for high-entropy secrets and keys.search_strings: Ultra-fast regex string hunting over decompiled code.
Dynamic Instrumentation (Frida)
frida_spawn: Spawns an app with early-instrumentation capabilities.frida_attach: Attaches to a running application process.frida_inject: Pushes raw JS or executes library bypass scripts live in memory.objection_run: High-level commands to explore application memory, classes, and SSL.
RASP & Anti-Tamper Bypass
rasp_identify: Identifies active enterprise app protections (Zimperium, DexGuard, Promon, Arxan).rasp_bypass: Dynamically generates targeted Frida bypass scripts for root detection, SSL pinning, and emulator checks.
Cross-Platform Scaffolding
hermes_decode: Extracts and decompiles React Native.hbcbundles to raw JSX.flutter_blutter: Scaffolds Flutter engine un-stripping and dart-compile recovery.
Device Control & Visuals
adb_shell/adb_pull/adb_push: Direct device bridging.scrcpy_start: Starts a background hardware-accelerated screen mirror.scrcpy_screenshot: Takes a pristine UI screenshot so the Agent can visually understand the app state.
Manipulation & Signing
apk_sign: Zipsigner & uber-apk-signer automation.apk_rebuild_sign: Re-compiles a modified Smali directory and re-signs it for immediate device installation.
🧠 Master Agent Workflow
This server ships with a massive built-in knowledge-base (master-agent-workflow) that AI agents read when they boots up. It enforces strict, logical reverse engineering methodologies, forcing agents to:
- Start with static mapping instead of blind dynamic analysis.
- Establish "Memory Profiles" using
memory_writeto keep persistent states over long sessions. - Consult built-in escalation playbooks (
bypass-ssl,bypass-root) if they get stuck.
🚀 Installation & Agent Integration
Claude Code
// .claude/mcp.json
{
"mcpServers": {
"mobile-security": {
"command": "python",
"args": ["-m", "mobile_security_mcp"]
}
}
}
Cline (VSCode)
"cline.mcpServers": {
"mobile-security": {
"command": "python",
"args": ["-m", "mobile_security_mcp"]
}
}
🤝 Contributing & Requesting Tools
We want to build the ultimate open-source, AI-driven Mobile Security framework. We welcome forks, pull requests, and community-driven knowledge!
Visit the Repository: github.com/mobile-security-mcp/mobile-security-mcp (Replace with actual repository link)
Have a tool suggestion?
If you maintain a fork or just love a specific open-source tool (like MobSF, RMS, Medusa, etc.), please open an issue at the link above! We are actively looking to add new handlers for:
- iOS decryption and LLDB bridging.
- Advanced unpacking tools.
- Web3 / Wallet security analyzers.
Feel free to fork the repo, create a new handler in mobile_security_mcp/handlers/, and submit a Pull Request!
Disclaimer: This tool is for educational and authorized penetration testing purposes only. You are solely responsible for ensuring you have explicit written permission before testing any application.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mobile_security_mcp-0.1.4.tar.gz.
File metadata
- Download URL: mobile_security_mcp-0.1.4.tar.gz
- Upload date:
- Size: 64.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
bb86e104ad830cf320d6eafd3841b34db4c2ee36410633139a5a0d1ca2ba9d63
|
|
| MD5 |
9356f22b404855b9ad410aed945600ec
|
|
| BLAKE2b-256 |
a6e6fb9f084dd1a70cd42943c4ff5db87c24404348f35a120136a10f8619dc17
|
File details
Details for the file mobile_security_mcp-0.1.4-py3-none-any.whl.
File metadata
- Download URL: mobile_security_mcp-0.1.4-py3-none-any.whl
- Upload date:
- Size: 77.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.14.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f9bfe6ed890e9195619b695553f6e63d17f3044dfb623f12529a2fcfdba876cf
|
|
| MD5 |
79a63c90723c46a1323333e46f429519
|
|
| BLAKE2b-256 |
5794679534f72079dc50859a752a31fb841c153b092f7cdb56b11a752c3e659b
|