JameZUK/Arkana

Arkana - Your entire malware analysis lab, behind one AI prompt. 209 MCP tools for binary analysis with Claude Code or other MCP

37
/ 100
Emerging

This project helps cybersecurity professionals analyze suspicious files, like malware, quickly and effectively. You provide a file and a natural language question about it, and Arkana uses numerous specialized analysis tools to deliver a detailed report on its behavior, indicators of compromise, and potential threats. It's designed for security operations center (SOC) analysts, malware reversers, and incident responders.

Use this if you need to rapidly understand what a suspicious binary does, its C2 servers, or its MITRE ATT&CK techniques without manually juggling multiple complex tools.

Not ideal if your primary task is general software development or if you need to analyze source code rather than compiled binaries.

malware-analysis incident-response threat-intelligence reverse-engineering cybersecurity-operations
No Package No Dependents
Maintenance 10 / 25
Adoption 5 / 25
Maturity 11 / 25
Community 11 / 25

How are scores calculated?

Stars

12

Forks

2

Language

Python

License

MIT

Last pushed

Mar 11, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/JameZUK/Arkana"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.