Ap3x/BinaryAnalysis-MCP

MCP server for analyzing PE, ELF, and Mach-O binaries using LIEF

32
/ 100
Emerging

This tool helps cybersecurity analysts quickly understand compiled executable files like Windows .exe, Linux ELF, or macOS Mach-O binaries. You provide a file path, and it outputs detailed information about the binary's structure, security features, and dependencies. It's designed for malware analysts, reverse engineers, and digital forensics professionals.

Use this if you need to rapidly triage unknown or suspicious executable files to identify their format, architecture, security hardening, and imported libraries without deep reverse engineering.

Not ideal if you require dynamic analysis, in-depth decompilation, or control-flow graphing of the binary's code.

malware-analysis reverse-engineering digital-forensics threat-intelligence vulnerability-research
No Package No Dependents
Maintenance 10 / 25
Adoption 6 / 25
Maturity 11 / 25
Community 5 / 25

How are scores calculated?

Stars

20

Forks

1

Language

Python

License

GPL-3.0

Last pushed

Mar 06, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/Ap3x/BinaryAnalysis-MCP"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.