Skip to main content

MCP server exposing Android security research tools for authorised penetration testing

Project description

mobile-security-mcp

Legitimate penetration testing toolkit — for use only on applications you are authorised to test.

An MCP (Model Context Protocol) server that effortlessly transforms any AI agent (Claude Code, Cline, Goose, OpenCode) into an elite Android security researcher by providing them direct access to the industry's most powerful reverse-engineering stack.

✨ Zero-Touch Automation

This MCP server features Zero-Touch automated configuration. It comes equipped with native Python downloaders that securely fetch, extract, and configure all the massive reverse-engineering binaries directly into ~/tools/—injecting them dynamically into your environment without forcing you to manually run brew, apt, or choco commands.

Just run the setup command, and it builds the entire penetration testing environment out of thin air:

# 1. Install via pip
pip install mobile-security-mcp

# 2. Run the Zero-Touch Setup (installs apktool, jadx, adb, frida, etc.)
python -m mobile_security_mcp --setup

🛠️ The Arsenal (Tools for Agents)

When an AI Agent connects to this server, they gain autonomous execution capability over the following tools:

Static Analysis & Reversing

  • apk_decompile: Unpacks APK via apktool (Smali).
  • apk_decompile_java: Hardware-accelerated source code extraction via jadx.
  • apk_identify: Uses apkid to fingerprint packers, obfuscators, and SDKs.
  • apk_scan_secrets: Scans the codebase for high-entropy secrets and keys.
  • search_strings: Ultra-fast regex string hunting over decompiled code.

Dynamic Instrumentation (Frida)

  • frida_spawn: Spawns an app with early-instrumentation capabilities.
  • frida_attach: Attaches to a running application process.
  • frida_inject: Pushes raw JS or executes library bypass scripts live in memory.
  • objection_run: High-level commands to explore application memory, classes, and SSL.

RASP & Anti-Tamper Bypass

  • rasp_identify: Identifies active enterprise app protections (Zimperium, DexGuard, Promon, Arxan).
  • rasp_bypass: Dynamically generates targeted Frida bypass scripts for root detection, SSL pinning, and emulator checks.

Cross-Platform Scaffolding

  • hermes_decode: Extracts and decompiles React Native .hbc bundles to raw JSX.
  • flutter_blutter: Scaffolds Flutter engine un-stripping and dart-compile recovery.

Device Control & Visuals

  • adb_shell / adb_pull / adb_push: Direct device bridging.
  • scrcpy_start: Starts a background hardware-accelerated screen mirror.
  • scrcpy_screenshot: Takes a pristine UI screenshot so the Agent can visually understand the app state.

Manipulation & Signing

  • apk_sign: Zipsigner & uber-apk-signer automation.
  • apk_rebuild_sign: Re-compiles a modified Smali directory and re-signs it for immediate device installation.

🧠 Master Agent Workflow

This server ships with a massive built-in knowledge-base (master-agent-workflow) that AI agents read when they boots up. It enforces strict, logical reverse engineering methodologies, forcing agents to:

  1. Start with static mapping instead of blind dynamic analysis.
  2. Establish "Memory Profiles" using memory_write to keep persistent states over long sessions.
  3. Consult built-in escalation playbooks (bypass-ssl, bypass-root) if they get stuck.

🚀 Installation & Agent Integration

Claude Code

// .claude/mcp.json
{
  "mcpServers": {
    "mobile-security": {
      "command": "python",
      "args": ["-m", "mobile_security_mcp"]
    }
  }
}

Cline (VSCode)

"cline.mcpServers": {
  "mobile-security": {
    "command": "python",
    "args": ["-m", "mobile_security_mcp"]
  }
}

🤝 Contributing & Requesting Tools

We want to build the ultimate open-source, AI-driven Mobile Security framework. We welcome forks, pull requests, and community-driven knowledge!

Visit the Repository: github.com/mobile-security-mcp/mobile-security-mcp (Replace with actual repository link)

Have a tool suggestion?

If you maintain a fork or just love a specific open-source tool (like MobSF, RMS, Medusa, etc.), please open an issue at the link above! We are actively looking to add new handlers for:

  • iOS decryption and LLDB bridging.
  • Advanced unpacking tools.
  • Web3 / Wallet security analyzers.

Feel free to fork the repo, create a new handler in mobile_security_mcp/handlers/, and submit a Pull Request!


Disclaimer: This tool is for educational and authorized penetration testing purposes only. You are solely responsible for ensuring you have explicit written permission before testing any application.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mobile_security_mcp-0.1.3.tar.gz (64.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mobile_security_mcp-0.1.3-py3-none-any.whl (77.2 kB view details)

Uploaded Python 3

File details

Details for the file mobile_security_mcp-0.1.3.tar.gz.

File metadata

  • Download URL: mobile_security_mcp-0.1.3.tar.gz
  • Upload date:
  • Size: 64.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for mobile_security_mcp-0.1.3.tar.gz
Algorithm Hash digest
SHA256 db8e2493853ee988fc6bf901e1051d9eeda0ba872b27e688129a6d22f52460dc
MD5 6816e6eacbcfcc783afd92b404ed5edc
BLAKE2b-256 f3354fe59433608a31e8c6ca3886ae628e13578ed7a650711c48429655543bc8

See more details on using hashes here.

File details

Details for the file mobile_security_mcp-0.1.3-py3-none-any.whl.

File metadata

File hashes

Hashes for mobile_security_mcp-0.1.3-py3-none-any.whl
Algorithm Hash digest
SHA256 99a368c91d4d4c03472547d23248e1cd15e5d452d8f7271fb7c4f5668ad28590
MD5 fb366b17804a72b0ece01cd7f53e1894
BLAKE2b-256 e9c00f3d07a3a270e4d4de573361391465fe965aa2f63e3c86535b6b56cf93d2

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page