home / mcp / so analyzer mcp server
Provides native SO analysis, Flutter SSL bypass, and cross-reference capabilities for APKs and Flutter binaries.
Configuration
View docs{
"mcpServers": {
"1600822305-so-analyzer-mcp": {
"command": "python",
"args": [
"K:/path/to/so-analyzer-mcp/run_server.py"
]
}
}
}SO Analyzer MCP is an open-source analysis toolkit that operates as an MCP server to inspect, patch, and decompile native libraries inside Android APKs. It provides Flutter SSL bypass, function and control-flow analysis, symbol cross-references, and a suite of utilities to dissect SO files and Flutter binaries. You can run it locally as an MCP server and access a wide range of analysis tools through an MCP client.
Set up your MCP client to connect to the SO Analyzer MCP server, then run tools to inspect or modify native libraries found inside APKs. The server exposes a collection of utilities that you can invoke from your MCP client to list libraries, detect Flutter components, extract SO files, search symbols, decompile, and perform advanced analyses like call graphs and control-flow graphs.
Prerequisites you need on your machine before installing are Python and a working network that can reach your MCP client. You will install dependencies and then run the MCP server script.
Check the analysis environment to ensure all required tools and libraries are available.
List all SO libraries present in the APK.
Extract a specified SO library from the APK.
Retrieve basic information about an SO file.
Get the list of exported symbols from an SO.
Get the list of imported symbols for an SO.
Extract strings from an SO file.
Search for specific symbols inside an SO.
Detect whether the APK uses Flutter.
Obtain the Flutter version used by the APK.
Find SSL verification-related functions in Flutter apps.
Intelligently locate SSL-related functions in Flutter binaries.
Patch SSL verification to bypass certificate checks.
One-click patch to Flutter APKs for SSL/verification bypass.
Modify bytes at a specified offset in an SO.
Search for a pattern of bytes within an SO.
Find and replace a byte sequence within an SO.
Disassemble code within an SO to view assembly.
Retrieve the bytecode of a specific function.
Find cross-references to a given string inside the binary.
Find a function by its address.
Analyze features and characteristics of a function.
Get information about code sections in an SO.
Identify all functions, including non-exported ones.
Generate a call graph and DOT representation of function calls.
Generate a control-flow graph and DOT representation.
Comprehensive advanced analysis of a function.
Decompile code to produce pseudocode.
Detect string encryption patterns within data.
Trace data flow and register usage across instructions.
Verify the presence and readiness of radare2 for analysis.
Verify the presence and readiness of Ghidra for analysis.