ida-pro-mcp and Nexuscore_MCP
These are complementary tools: IDA Pro provides static reverse engineering analysis while Frida-based dynamic malware analysis observes runtime behavior, so they would typically be used together in a comprehensive security analysis workflow.
About ida-pro-mcp
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
This tool helps reverse engineers analyze compiled software more efficiently by integrating advanced AI assistance directly into IDA Pro. It takes raw binary executables and, with the help of a language model, generates improved code comments, renamed variables, corrected data types, and descriptive function names. Malware analysts, security researchers, and software vulnerability explorers are the primary users.
About Nexuscore_MCP
sjkim1127/Nexuscore_MCP
AI-powered MCP server for dynamic malware analysis with Frida instrumentation, session-based debugging, and 46+ security tools
This project helps cybersecurity professionals and malware analysts to deeply understand how evasive malware works. It takes suspicious files as input and, with the assistance of an AI agent, interactively debugs and inspects their behavior. The output is a detailed understanding of the malware's techniques, allowing for better threat intelligence and defense.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work