JEB MCP Server
JEB MCP server enabling AI agents to interact with JEB — PNF Software's commercial Android and native binary decompiler — querying decompiled Dalvik/DEX bytecode, retrieving Java pseudocode, accessing cross-references and symbol information, and integrating JEB's Android analysis capabilities into agent-driven mobile app reverse engineering workflows.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Local JEB process. No credentials for MCP. JEB license required. Analyze APKs in isolated environment.
⚡ Reliability
Best When
A mobile security researcher with JEB needs AI-assisted Android app analysis — decompiled DEX/Java code combined with LLM reasoning for malware analysis or app auditing.
Avoid When
You don't have a JEB license, need iOS binary analysis, or prefer free Ghidra/jadx for Android RE.
Use Cases
- • Decompiling Android APK bytecode from mobile security research agents
- • Querying DEX/Dalvik disassembly and cross-references from RE agents
- • Analyzing Android malware with AI-assisted decompilation from threat research agents
- • Auditing Android applications for vulnerabilities from security audit agents
- • Retrieving Java pseudocode for binary understanding from analysis agents
- • Automating JEB scripting tasks via MCP from workflow agents
Not For
- • Teams without JEB license (commercial tool with significant cost)
- • iOS/macOS binary analysis (JEB focuses on Android/DEX; use Ghidra or IDA for iOS)
- • Source code analysis (JEB is for compiled Android/binary code)
Interface
Authentication
No authentication for MCP — JEB script runs inside JEB process via JEB's Python scripting API. JEB license required separately. MCP connects to running JEB instance.
Pricing
JEB is commercial software. MCP server (jebmcp) is free open source. JEB license required for full decompilation capabilities.
Agent Metadata
Known Gotchas
- ⚠ JEB must be running with APK loaded and JEB Python scripting active
- ⚠ JEB scripting API changes between JEB versions — ensure compatibility
- ⚠ Decompilation quality depends on APK obfuscation and ProGuard usage
- ⚠ Community MCP from dawnslab — niche tool for JEB users
- ⚠ JEB Python API is different from IDA's IDAPython — scripts not portable
- ⚠ Analyze APK fully in JEB before querying for best decompilation results
Alternatives
Full Evaluation Report
Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for JEB MCP Server.
Scores are editorial opinions as of 2026-03-06.