NexusCore_MCP
by sjkim1127
Overview
AI-driven dynamic malware analysis and evasion in a Windows virtualized environment.
Installation
.\target\release\nexuscore_mcp.exeEnvironment Variables
- VT_API_KEY
- CAPE_API_URL
- CAPE_API_TOKEN
- SCYLLA_PATH
- RUST_LOG
Security Notes
This project is a security tool designed to interact with and analyze malware at a low level. Its operations inherently involve techniques like process injection, memory manipulation, and network interception, which would be malicious in other contexts. The tool is transparent about these methods (e.g., Frida for anti-debug bypass, memory dumping, API hooking). It strongly emphasizes running only in a secure, isolated Virtual Machine, which is critical. The codebase is Rust-based, offering memory safety benefits. The security score reflects the tool's intended use and design for security analysis, not its vulnerability. Running outside a secure VM is extremely dangerous.
Similar Servers
ida-pro-mcp
An AI-powered reverse engineering assistant that integrates IDA Pro with Model Context Protocol clients for enhanced analysis.
jadx-mcp-server
A fully automated Model Context Protocol (MCP) server that acts as a bridge for LLMs (like Claude) to interact with a JADX-AI-MCP plugin for Android APK reverse engineering, vulnerability analysis, and manifest parsing.
mcp-watch
A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in MCP implementations.
TriageMCP
Enables an LLM to perform static analysis and triage of PE files using local security tools.