dJEB_mcp_server
Verified Safeby dPhoeniixx
Overview
Bridges Claude Desktop with JEB decompiler for AI-assisted Android APK reverse engineering workflows, enabling advanced analysis directly within Claude.
Installation
No command providedSecurity Notes
The system involves running a script within JEB that exposes its API over a local socket to Claude Desktop via a Python bridge. While the connection is local (port 8851), exposing a powerful decompiler API to an AI client means that malicious or unexpected prompts could potentially trigger unintended actions through the JEB API. No explicit 'eval' is mentioned, but the nature of directly invoking decompiler functionality based on AI instructions requires trust in both the AI's understanding and the tool's input sanitization. Generally safe when used as intended by a knowledgeable user.
Similar Servers
DesktopCommanderMCP
Enables an AI agent to interact with the local filesystem and terminal, execute commands, analyze data, and perform code editing.
jadx-ai-mcp
Integrates JADX decompiler with LLMs via Model Context Protocol for AI-powered Android APK analysis and reverse engineering.
jadx-mcp-server
A fully automated Model Context Protocol (MCP) server that acts as a bridge for LLMs (like Claude) to interact with a JADX-AI-MCP plugin for Android APK reverse engineering, vulnerability analysis, and manifest parsing.
gsd-task-manager
A privacy-first, open-source task manager leveraging the Eisenhower Matrix for prioritization, offering optional end-to-end encrypted cloud synchronization and AI-powered natural language task management through integration with Claude Desktop via the MCP server.