Fatmike-GH/MCPDebugger

A lightweight MCP debugger designed for learning and experimentation. Supports Windows executables (x86 and x64).

32
/ 100
Emerging

This tool helps reverse engineers and security researchers analyze Windows executables (x86 and x64) by providing a lightweight debugger that integrates with AI clients like GitHub Copilot. It takes compiled Windows programs as input and allows you to control their execution, inspect memory, disassemble code, and analyze modules, providing detailed insights into how the software works. Its primary users are individuals performing software analysis or vulnerability research.

Use this if you are a reverse engineer or security analyst who wants to use AI tools to help analyze Windows executables and understand their behavior.

Not ideal if you need a traditional, standalone graphical debugger or if you are analyzing non-Windows or non-x86/x64 executables.

reverse-engineering malware-analysis vulnerability-research software-auditing executable-analysis
No Package No Dependents
Maintenance 6 / 25
Adoption 5 / 25
Maturity 13 / 25
Community 8 / 25

How are scores calculated?

Stars

9

Forks

1

Language

C

License

MIT

Category

debugging-ai-mcp

Last pushed

Dec 23, 2025

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/Fatmike-GH/MCPDebugger"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.