MCPquality 0.59

dJEB

Integrates with JEB decompiler through a Python-Jython bridge to enable direct Android APK analysis, method decompila...

Price
free
Protocol
mcp
Verified
no

What it does

Integrates with JEB decompiler through a Python-Jython bridge to enable direct Android APK analysis, method decompilation, code element manipulation, cross-reference analysis, manifest extraction, and automated refactoring operations for reverse engineering and security assessment workflows.

Provides direct access to JEB decompiler functionality for Android APK analysis through a Python-Jython bridge architecture. Exposes tools for decompiling methods and classes, listing and renaming code elements, analyzing cross-references, retrieving manifest and resource files with grep filtering, and performing batch operations on DEX bytecode structures. Built with a socket-based server running inside JEB and a bridge client for Claude Desktop integration, it enables reverse engineering workflows including malware analysis, vulnerability research, and Android application security assessment by allowing natural language queries against decompiled code, resource extraction, and automated refactoring operations.

Capabilities

mcptransport-stdioopen-source

Server

Quality

0.59/ 1.00

deterministic score 0.59 from registry signals: · indexed on pulsemcp · has source repo · 18 github stars · registry-generated description present

Provenance

Indexed frompulsemcp
Enriched2026-04-24 17:22:09Z · deterministic:mcp:v1 · v1
First seen2026-04-21
Last seen2026-04-24

Agent access