ida-pro-mcp and Nexuscore_MCP

These are complementary tools: IDA Pro provides static reverse engineering analysis while Frida-based dynamic malware analysis observes runtime behavior, so they would typically be used together in a comprehensive security analysis workflow.

ida-pro-mcp
78
Verified
Nexuscore_MCP
34
Emerging
Maintenance 22/25
Adoption 10/25
Maturity 25/25
Community 21/25
Maintenance 10/25
Adoption 6/25
Maturity 13/25
Community 5/25
Stars: 6,275
Forks: 713
Downloads:
Commits (30d): 81
Language: Python
License: MIT
Stars: 15
Forks: 1
Downloads:
Commits (30d): 0
Language: Rust
License: MIT
No risk flags
No Package No Dependents

About ida-pro-mcp

mrexodia/ida-pro-mcp

AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.

This tool helps reverse engineers analyze compiled software more efficiently by integrating advanced AI assistance directly into IDA Pro. It takes raw binary executables and, with the help of a language model, generates improved code comments, renamed variables, corrected data types, and descriptive function names. Malware analysts, security researchers, and software vulnerability explorers are the primary users.

reverse-engineering malware-analysis vulnerability-research binary-analysis software-auditing

About Nexuscore_MCP

sjkim1127/Nexuscore_MCP

AI-powered MCP server for dynamic malware analysis with Frida instrumentation, session-based debugging, and 46+ security tools

This project helps cybersecurity professionals and malware analysts to deeply understand how evasive malware works. It takes suspicious files as input and, with the assistance of an AI agent, interactively debugs and inspects their behavior. The output is a detailed understanding of the malware's techniques, allowing for better threat intelligence and defense.

malware-analysis reverse-engineering threat-intelligence cybersecurity incident-response

Scores updated daily from GitHub, PyPI, and npm data. How scores work