JameZUK/Arkana
Arkana - Your entire malware analysis lab, behind one AI prompt. 209 MCP tools for binary analysis with Claude Code or other MCP
This project helps cybersecurity professionals analyze suspicious files, like malware, quickly and effectively. You provide a file and a natural language question about it, and Arkana uses numerous specialized analysis tools to deliver a detailed report on its behavior, indicators of compromise, and potential threats. It's designed for security operations center (SOC) analysts, malware reversers, and incident responders.
Use this if you need to rapidly understand what a suspicious binary does, its C2 servers, or its MITRE ATT&CK techniques without manually juggling multiple complex tools.
Not ideal if your primary task is general software development or if you need to analyze source code rather than compiled binaries.
Stars
12
Forks
2
Language
Python
License
MIT
Category
Last pushed
Mar 11, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/JameZUK/Arkana"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
Wh0am123/MCP-Kali-Server
MCP configuration to connect AI agent to a Linux machine.
DMontgomery40/pentest-mcp
NOT for educational purposes: An MCP server for professional penetration testers including...
BurtTheCoder/mcp-shodan
MCP server for Shodan — search internet-connected devices, IP reconnaissance, DNS lookups, and...
cyproxio/mcp-for-security
MCP for Security: A collection of Model Context Protocol servers for popular security tools like...
0x4m4/hexstrike-ai
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot,...