MCP Directory
Back

agentic-malware-analysis

by mrphrazer · YARA · ★ 197

Agentic malware analysis environment with MCP-connected disassemblers, RE tooling, and structured workflows for Claude Code and Codex CLI.

Install

git clone https://github.com/mrphrazer/agentic-malware-analysis.git

Claude Desktop config

Add this to your claude_desktop_config.json:

{
  "mcpServers": {
    "agentic-malware-analysis": {
      "command": "npx",
      "args": [
        "-y",
        "github:mrphrazer/agentic-malware-analysis"
      ]
    }
  }
}

From the README

Automated deep malware reverse engineering driven by AI agents. A Kali-based Docker environment pairs 50+ RE tools with MCP-connected disassembler backends ([Binary Ninja][binary-ninja-headless-mcp] or [Ghidra][ghidra-headless-mcp]) and a structured multi-phase orchestrator skill that turns a raw binary into a case directory of ranked evidence, validated hypotheses, component maps, and a prioritized deep-analysis plan -- with no human interaction required. Ready for [Claude Code][claude-code] and [Codex CLI][codex-cli]. See the companion blog post [Building a Pipeline for Agentic Malware Anal…
Read full README on GitHub →

💡 Need a managed MCP host?

Try Claude Pro for the smoothest MCP experience, or browse our cloud-hosted servers.

Related filesystem servers