ida-pro-mcp and Nexuscore_MCP
These are complementary tools: IDA Pro provides static reverse engineering analysis while Frida-based dynamic malware analysis observes runtime behavior, so they would typically be used together in a comprehensive security analysis workflow.
About ida-pro-mcp
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Exposes IDA Pro's analysis capabilities as MCP tools (decompilation retrieval, disassembly inspection, variable renaming, type correction) that language models can invoke to assist with reverse engineering workflows. Implements both stdio and SSE transports with support for headless analysis via `idalib`, enabling integration with any MCP-compatible client from Claude to VS Code. Includes specialized tooling like `int_convert` for base conversion and session isolation for concurrent multi-agent analysis on different binaries.
About Nexuscore_MCP
sjkim1127/Nexuscore_MCP
AI-powered MCP server for dynamic malware analysis with Frida instrumentation, session-based debugging, and 46+ security tools
Implements persistent Frida and debugger sessions for interactive malware manipulation, with streaming memory dumps optimized for LLM context windows and live synchronization to reverse-engineering tools like Ghidra. Built in Rust with Model Context Protocol (stdio transport), it combines microemulation, YARA self-correction loops, and sandboxed Python decryptor testing to enable autonomous analysis workflows without context switching.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work