Back to Home
sjkim1127 icon

NexusCore_MCP

by sjkim1127

Overview

AI-driven dynamic malware analysis and evasion in a Windows virtualized environment.

Installation

Run Command
.\target\release\nexuscore_mcp.exe

Environment Variables

  • VT_API_KEY
  • CAPE_API_URL
  • CAPE_API_TOKEN
  • SCYLLA_PATH
  • RUST_LOG

Security Notes

This project is a security tool designed to interact with and analyze malware at a low level. Its operations inherently involve techniques like process injection, memory manipulation, and network interception, which would be malicious in other contexts. The tool is transparent about these methods (e.g., Frida for anti-debug bypass, memory dumping, API hooking). It strongly emphasizes running only in a secure, isolated Virtual Machine, which is critical. The codebase is Rust-based, offering memory safety benefits. The security score reflects the tool's intended use and design for security analysis, not its vulnerability. Running outside a secure VM is extremely dangerous.

Similar Servers

Stats

Interest Score0
Security Score9
Cost ClassMedium
Avg Tokens3000
Stars0
Forks0
Last Update2025-12-06

Tags

AIMalware AnalysisDynamic AnalysisFridaWindows Security