MalDev-Analyzer-MCP
MalDev-Analyzerは、マルウェア分析を目的としたPythonベースのツールです。ユーザーは、悪意のあるソフトウェアの挙動を詳細に解析し、リスクを評価することができます。直感的なインターフェースと強力な機能により、セキュリティ専門家や研究者にとって有用なツールです。
GitHubスター
30
ユーザー評価
未評価
お気に入り
0
閲覧数
9
フォーク
3
イシュー
0
MalDev Analyzer MCP
Built for red teamers, by red teamers - an MCP-powered assistant for malware development, OPSEC testing, and custom loader design during red team engagements.
MalDev Analyzer MCP is designed to help offensive security professionals and malware developers quickly evaluate Windows binaries for traits that may impact stealth, functionality, or OPSEC. Whether you're building a loader, refining an implant, or validating payload security posture, this tool provides fast, targeted insights.
TL'DR: want to jump to installation? Go to Prerequisites & Quick Installation section.
✨ Key Features
- MCP Integration – Works with the Model Context Protocol to interact directly with compatible AI assistants like Cursor.
- Binary Trait Analysis – Identify patterns common in real-world malware and red team tooling.
- OPSEC Checks – Spot traits that could raise detection risk during engagements.
- Custom Loader Support – Designed with loader development workflows in mind.
Motivation
As a red-teamer, time is a luxury.
In real-world red team engagements, malware analysis and OPSEC checks often require juggling a patchwork of GUI tools — PE-Bear, Detect-It-Easy, Resource Hacker, YARA scanners, and more. Each demands manual clicks, constant context switching, and repetitive steps just to extract the handful of indicators you actually care about.
MalDev Analyzer MCP was built to eliminate that friction.
By embedding a full suite of PE inspection, loader analysis, and OPSEC heuristics directly into your MCP-compatible IDE (like Cursor or Claude’s MCP mode), you can query and analyze binaries without leaving your workflow.
With MalDev Analyzer MCP you can:
- Correlate IAT entries vs. runtime strings to uncover IAT hiding & dynamic API resolution.
- Classify sections using known baselines, flag anomalies, and detect packer indicators (e.g.,
.upx
,.rsrc2
,.textbss
). - Detect real-world malicious traits like AMSI/ETW patch patterns, C2 framework indicators, embedded shellcode, or encrypted blobs.
- ...and much more.
By performing contextual scoring instead of raw dumping, you immediately know whether a finding is benign, suspicious, or likely malicious.
The goal: bridge the gap between generic PE analysis and practical OPSEC testing for loader and implant development - all inside an MCP workflow, without bouncing between multiple GUIs or command-line tools.
This means faster turnarounds, less human error, and more focus on developing and refining your custom loaders - not wrestling with a dozen disconnected tools.
🛠 Included Analysis Tools
Tool | Purpose |
---|---|
File Hashing | Compute SHA-256 and MD5 hashes for quick identification. |
String Extraction | Extract top ASCII/UTF-16 strings to quickly surface suspicious terms. |
Suspicious API Detection | Flag WinAPI calls often used in malware development. |
C2 Framework Indicators | Detect known C2 framework names embedded in binaries. |
Section Analysis | Identify unusual or risky PE section names. |
Shannon Entropy | Detect high-entropy data that may indicate encryption/packing. |
Import Table (IAT) Analysis | Compare declared imports to discovered API usage to spot hiding/obfuscation. |
Export Table Analysis | Highlight exports with suspicious keywords or patterns. |
PE Metadata Information | Extract basic file metadata for further profiling. |
PE Sections Inspection | Perform heuristic shellcode detection for raw blobs or embedded PE sections. |
📋 Prerequisites
- Python 3.8 or higher with installed dependencies
- MCP Client (Tested with Cursor IDE)
🚀 Quick Installtion
1. Install dependencies:
git clone https://github.com/RootInj3c/MalDev-Analyzer-MCP.git
cd MalDev-Analyzer-MCP
2. Install dependencies:
pip install -r requirements.txt
2. Configure in MCP Client
Add to your MCP servers JSON (or equivalent MCP client config):
{
"mcpServers": {
"maldev-analyzer": {
"command": "python",
"args": ["PATH/TO/maldev_analyzer.py"]
}
}
}
🔧 Example MCP Queries
Example queries you can ask through the MCP:
- "Scan this file for suspicious API calls and potential IAT hiding"
- "Check this binary for section anomalies or known packer signatures"
- "Analyze this loader for C2 indicators and hardcoded framework names"
- "Extract the top suspicious strings from this executable"
- "Perform export table analysis on this file"
- "Check file hashes and entropy score"
- "Identify any suspicious persistence or injection-related APIs"
- "Run full OPSEC analysis on this loader for red team use"
📜 License
This project is licensed under the MIT License - see the LICENSE file for details.
⚠ Disclaimer
This tool is intended only for authorized security testing, research, and educational purposes in controlled environments. Misuse of this tool for malicious purposes is prohibited and may be illegal. The authors assume no liability for misuse.