Execute terminal commands for malware analysis. Requires Node.js 18 or higher.
{{ message }}
MCP-Mirror / abdessamad-elamrani_MalwareAnalyzerMCP Public
Mirror of https://github.com/abdessamad-elamrani/MalwareAnalyzerMCP
0 stars0 forksBranches Tags Activity
Star
Notifications
Simple
BranchesTags
Go to file
Code
Name | Name | Last commit message | Last commit date |
---|---|---|---|
10 Commits | |||
.vscode | .vscode | ||
logs | logs | ||
node_modules | node_modules | ||
IMPLEMENTATION.md | IMPLEMENTATION.md | ||
README.md | README.md | ||
commands.js | commands.js | ||
index.js | index.js | ||
loader.js | loader.js | ||
package-lock.json | package-lock.json | ||
package.json | package.json | ||
serverMCP.js | serverMCP.js | ||
terminalManager.js | terminalManager.js | ||
View all files |
A specialized MCP server for Claude Desktop that allows executing terminal commands for malware analysis.
file
, strings
, hexdump
, objdump
, xxd
)npm install
node index.js
npm start
npm run debug
To integrate this MCP server with Claude Desktop:
{ "mcpServers": { "MalwareAnalysisMCP": { "command": "node", "args": [ "/path/to/MalwareAnalysisMCP/index.js" ] } } }
Note: Replace
/path/to/MalwareAnalysisMCP
with the actual path to your project directory.
To see all communication between Claude Desktop and the MCP server:
{ "mcpServers": { "MalwareAnalysisMCP": { "command": "node", "args": [ "/path/to/MalwareAnalysisMCP/mcp-debug-proxy.js" ] } } }
logs
directoryExecutes a terminal command and returns its process ID, output, and blocked status.
Parameters:
command
(string): The command to execute in the terminaltimeout_ms
(number, optional): Timeout in milliseconds (default: 30000)Returns:
pid
(number): Process IDoutput
(string): Command outputisBlocked
(boolean): Whether the command execution is blocked/timed outReads output from a running or completed process.
Parameters:
pid
(number): The process ID to read output fromReturns:
output
(string | null): The process output, or null if the process is not foundThe following specialized tools are available for malware analysis:
Analyze a file and determine its type.
Parameters:
target
(string): Target file to analyzeoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "options": "-b" }
Extract printable strings from a file.
Parameters:
target
(string): Target file to analyzeminLength
(number, optional): Minimum string length to displayencoding
(string, optional): String encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)options
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "minLength": 10, "encoding": "l" }
Display file contents in hexadecimal format.
Parameters:
target
(string): Target file to analyzelength
(number, optional): Number of bytes to displayoffset
(number, optional): Starting offset in the fileoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "length": 256, "offset": 1024 }
Display information from object files.
Parameters:
target
(string): Target file to analyzedisassemble
(boolean, optional): Disassemble executable sectionsheaders
(boolean, optional): Display the contents of the section headersoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "disassemble": true }
Create a hexdump with ASCII representation.
Parameters:
target
(string): Target file to analyzelength
(number, optional): Number of bytes to displayoffset
(number, optional): Starting offset in the filecols
(number, optional): Format output into specified number of columnsbits
(boolean, optional): Switch to bits (binary) dumpoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "cols": 16, "bits": true }
ISC
Readme
Activity
Custom properties
0 stars
0 watching
0 forks
Report repository
No releases published
No packages published
Provides multi-cluster Kubernetes management and operations using MCP, It can be integrated as an SDK into your own project and includes nearly 50 built-in tools covering common DevOps and development scenarios. Supports both standard and CRD resources.
Control Android devices using the Android Debug Bridge (ADB).
An unofficial MCP server plugin for remote control of Unreal Engine using AI tools.
Set up and interact with your unstructured data processing workflows in Unstructured Platform
MCP server empowers LLMs to interact with JSON files efficiently. With JSON MCP, you can split, merge, etc.
Performs data enrichment on observables using third-party services via the security-cli Python package.
An MCP (Model Context Protocol) aggregator that allows you to combine multiple MCP servers into a single endpoint allowing to filter specific tools.
Manage Buildkite pipelines and builds.
A template for deploying a remote, auth-less MCP server on Cloudflare Workers.
Token-efficient access to OpenAPI/Swagger specs via MCP Resources