sjkim1127/Nexuscore_MCP
AI-powered MCP server for dynamic malware analysis with Frida instrumentation, session-based debugging, and 46+ security tools
This project helps cybersecurity professionals and malware analysts to deeply understand how evasive malware works. It takes suspicious files as input and, with the assistance of an AI agent, interactively debugs and inspects their behavior. The output is a detailed understanding of the malware's techniques, allowing for better threat intelligence and defense.
Use this if you need to perform advanced, interactive dynamic analysis of sophisticated malware that attempts to evade traditional sandbox detection.
Not ideal if you primarily need quick, automated static analysis reports without interactive debugging or AI-driven investigation.
Stars
15
Forks
1
Language
Rust
License
MIT
Category
Last pushed
Mar 11, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/sjkim1127/Nexuscore_MCP"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Compare
Higher-rated alternatives
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
symgraph/GhidrAssistMCP
An MCP extension for Ghidra
soth-ai/mcp-reticle
Reticle intercepts, visualizes, and profiles JSON-RPC traffic between your LLM and MCP servers...
x42en/sysplant
Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP