{"id":"218c7683-ee01-4f18-815f-4e16620482c5","shortId":"FsR4Qt","kind":"mcp","title":"Malware Analyzer","tagline":"Provides specialized terminal access to common malware analysis tools like 'strings', 'file', 'hexdump', and 'objdump...","description":"Provides specialized terminal access to common malware analysis tools like 'strings', 'file', 'hexdump', and 'objdump' with parameter validation and timeout handling for security researchers analyzing suspicious files.\n\nMalwareAnalyzerMCP provides specialized terminal access for malware analysis through the Model Context Protocol. Developed by Abdessamad El Amrani, it implements a configuration-driven approach that exposes common malware analysis tools like 'strings', 'file', 'hexdump', 'objdump', and 'xxd' as structured commands with parameter validation. The server manages terminal processes with timeout handling and output buffering, making it ideal for security researchers who need to analyze suspicious files directly within Claude Desktop without switching to external tools.","tags":["malware","analyzer"],"capabilities":["mcp","transport-stdio","open-source"],"categories":[],"synonyms":[],"warnings":[],"endpointUrl":"https://github.com/abdessamad-elamrani/malwareanalyzermcp","protocol":"mcp","transport":"stdio","auth":{"type":"mcp","details":{"transport":"stdio"}},"qualityScore":"0.554","qualityRationale":"deterministic score 0.55 from registry signals: · indexed on pulsemcp · has source repo · 2 github stars · registry-generated description present","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:mcp:v1","enrichmentVersion":1,"enrichedAt":"2026-05-02T23:22:03.212Z","embedding":null,"createdAt":"2026-04-18T20:48:17.468Z","updatedAt":"2026-05-02T23:22:03.212Z","lastSeenAt":"2026-05-02T23:22:03.212Z","tsv":"'abdessamad':60 'access':6,21,49 'amrani':62 'analysi':10,25,52,74 'analyz':2,42,109 'approach':69 'buffer':99 'claud':114 'command':85 'common':8,23,72 'configur':67 'configuration-driven':66 'context':56 'desktop':115 'develop':58 'direct':112 'driven':68 'el':61 'expos':71 'extern':119 'file':14,29,44,78,111 'handl':38,96 'hexdump':15,30,79 'ideal':102 'implement':64 'like':12,27,76 'make':100 'malwar':1,9,24,51,73 'malwareanalyzermcp':45 'manag':91 'mcp' 'model':55 'need':107 'objdump':17,32,80 'open-source' 'output':98 'paramet':34,87 'process':93 'protocol':57 'provid':3,18,46 'research':41,105 'secur':40,104 'server':90 'special':4,19,47 'string':13,28,77 'structur':84 'suspici':43,110 'switch':117 'termin':5,20,48,92 'timeout':37,95 'tool':11,26,75,120 'transport-stdio' 'valid':35,88 'within':113 'without':116 'xxd':82","prices":[{"id":"08d71ea6-3061-4836-9a10-f8304a84cb32","listingId":"218c7683-ee01-4f18-815f-4e16620482c5","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"mcp-free","isPrimary":true,"details":{"transport":"stdio"},"createdAt":"2026-04-18T20:48:17.468Z"}],"sources":[{"listingId":"218c7683-ee01-4f18-815f-4e16620482c5","source":"pulsemcp","sourceId":"https://www.pulsemcp.com/servers/abdessamad-elamrani-malware-analyzer","sourceUrl":"https://api.pulsemcp.com/v0beta/servers","isPrimary":true,"firstSeenAt":"2026-04-18T20:48:17.468Z","lastSeenAt":"2026-05-02T23:22:03.212Z"}],"details":{"listingId":"218c7683-ee01-4f18-815f-4e16620482c5","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"source":"pulsemcp","transport":"stdio","server_name":"Malware Analyzer","github_stars":2,"registry_url":"https://www.pulsemcp.com/servers/abdessamad-elamrani-malware-analyzer","source_code_url":"https://github.com/abdessamad-elamrani/malwareanalyzermcp"},"updatedAt":"2026-05-02T23:22:03.212Z"}}