sjkim1127/Nexuscore_MCP
AI-powered MCP server for dynamic malware analysis with Frida instrumentation, session-based debugging, and 46+ security tools
Implements persistent Frida and debugger sessions for interactive malware manipulation, with streaming memory dumps optimized for LLM context windows and live synchronization to reverse-engineering tools like Ghidra. Built in Rust with Model Context Protocol (stdio transport), it combines microemulation, YARA self-correction loops, and sandboxed Python decryptor testing to enable autonomous analysis workflows without context switching.
Stars
15
Forks
1
Language
Rust
License
MIT
Category
Last pushed
Mar 11, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/sjkim1127/Nexuscore_MCP"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Compare
Higher-rated alternatives
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
symgraph/GhidrAssistMCP
An MCP extension for Ghidra
soth-ai/mcp-reticle
Reticle intercepts, visualizes, and profiles JSON-RPC traffic between your LLM and MCP servers...
x42en/sysplant
Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP