ida-pro-mcp and Nexuscore_MCP

These are complementary tools: IDA Pro provides static reverse engineering analysis while Frida-based dynamic malware analysis observes runtime behavior, so they would typically be used together in a comprehensive security analysis workflow.

ida-pro-mcp
89
Verified
Nexuscore_MCP
33
Emerging
Maintenance 25/25
Adoption 18/25
Maturity 25/25
Community 21/25
Maintenance 13/25
Adoption 6/25
Maturity 9/25
Community 5/25
Stars: 6,275
Forks: 713
Downloads: 2,296
Commits (30d): 80
Language: Python
License: MIT
Stars: 15
Forks: 1
Downloads:
Commits (30d): 0
Language: Rust
License: MIT
No risk flags
No Package No Dependents

About ida-pro-mcp

mrexodia/ida-pro-mcp

AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.

Exposes IDA Pro's analysis capabilities as MCP tools (decompilation retrieval, disassembly inspection, variable renaming, type correction) that language models can invoke to assist with reverse engineering workflows. Implements both stdio and SSE transports with support for headless analysis via `idalib`, enabling integration with any MCP-compatible client from Claude to VS Code. Includes specialized tooling like `int_convert` for base conversion and session isolation for concurrent multi-agent analysis on different binaries.

About Nexuscore_MCP

sjkim1127/Nexuscore_MCP

AI-powered MCP server for dynamic malware analysis with Frida instrumentation, session-based debugging, and 46+ security tools

Implements persistent Frida and debugger sessions for interactive malware manipulation, with streaming memory dumps optimized for LLM context windows and live synchronization to reverse-engineering tools like Ghidra. Built in Rust with Model Context Protocol (stdio transport), it combines microemulation, YARA self-correction loops, and sandboxed Python decryptor testing to enable autonomous analysis workflows without context switching.

Scores updated daily from GitHub, PyPI, and npm data. How scores work