Malware Analyzer
STDIOSpecialized MCP server executing terminal commands for malware analysis.
Specialized MCP server executing terminal commands for malware analysis.
A specialized MCP server for Claude Desktop that allows executing terminal commands for malware analysis.
file
, strings
, hexdump
, objdump
, xxd
)# Install dependencies npm install
# Start the server directly node index.js # Or use npm script npm start # With debugging proxy (logs all communications) npm run debug
To integrate this MCP server with Claude Desktop:
{ "mcpServers": { "MalwareAnalysisMCP": { "command": "node", "args": [ "/path/to/MalwareAnalysisMCP/index.js" ] } } }
Note: Replace
/path/to/MalwareAnalysisMCP
with the actual path to your project directory.
To see all communication between Claude Desktop and the MCP server:
{ "mcpServers": { "MalwareAnalysisMCP": { "command": "node", "args": [ "/path/to/MalwareAnalysisMCP/mcp-debug-proxy.js" ] } } }
logs
directoryExecutes a terminal command and returns its process ID, output, and blocked status.
Parameters:
command
(string): The command to execute in the terminaltimeout_ms
(number, optional): Timeout in milliseconds (default: 30000)Returns:
pid
(number): Process IDoutput
(string): Command outputisBlocked
(boolean): Whether the command execution is blocked/timed outReads output from a running or completed process.
Parameters:
pid
(number): The process ID to read output fromReturns:
output
(string | null): The process output, or null if the process is not foundThe following specialized tools are available for malware analysis:
Analyze a file and determine its type.
Parameters:
target
(string): Target file to analyzeoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "options": "-b" }
Extract printable strings from a file.
Parameters:
target
(string): Target file to analyzeminLength
(number, optional): Minimum string length to displayencoding
(string, optional): String encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)options
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "minLength": 10, "encoding": "l" }
Display file contents in hexadecimal format.
Parameters:
target
(string): Target file to analyzelength
(number, optional): Number of bytes to displayoffset
(number, optional): Starting offset in the fileoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "length": 256, "offset": 1024 }
Display information from object files.
Parameters:
target
(string): Target file to analyzedisassemble
(boolean, optional): Disassemble executable sectionsheaders
(boolean, optional): Display the contents of the section headersoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "disassemble": true }
Create a hexdump with ASCII representation.
Parameters:
target
(string): Target file to analyzelength
(number, optional): Number of bytes to displayoffset
(number, optional): Starting offset in the filecols
(number, optional): Format output into specified number of columnsbits
(boolean, optional): Switch to bits (binary) dumpoptions
(string, optional): Additional command-line optionsExample:
{ "target": "suspicious.exe", "cols": 16, "bits": true }
ISC