Skip to main content
Glama
REMnux

REMnux MCP Server

Official
by REMnux

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
hostNoSSH host (required for ssh mode)
modeNoConnection mode: docker, ssh, or localdocker
portNoSSH port (for ssh mode)22
userNoSSH user (for ssh mode)remnux
sandboxNoEnable path sandboxing (restrict files to samples/output dirs)off
timeoutNoDefault command timeout in seconds300
passwordNoSSH password (for ssh mode; uses SSH agent if omitted)
MCP_TOKENNoBearer token for HTTP auth (environment variable alternative to --http-token)
containerNoDocker container name/IDremnux
http-hostNoHTTP bind address (for http transport)127.0.0.1
http-portNoHTTP server port (for http transport)3000
transportNoTransport mode: stdio or httpstdio
http-tokenNoBearer token for HTTP auth
output-dirNoOutput directory path inside REMnux/home/remnux/files/output
samples-dirNoSamples directory path inside REMnux/home/remnux/files/samples

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{
  "listChanged": true
}
resources
{
  "listChanged": true
}

Tools

Functions exposed to the LLM to take actions

NameDescription
run_tool

Execute a command in REMnux. Supports piped commands (e.g., 'oledump.py sample.doc | grep VBA'). String extraction: For PE files use 'pestr'; for non-PE use 'strings' (ASCII) and 'strings -el' (Unicode).

get_file_info

Get file type, hashes, and basic metadata

list_files

List files in samples or output directory

extract_archive

Extract files from a compressed archive (.zip, .7z, .rar). Automatically tries common malware passwords if the archive is password-protected. Returns list of extracted files.

upload_from_host

Upload a file from the host filesystem to the samples directory for analysis. Accepts an absolute host path — the MCP server reads the file locally and transfers it. Maximum file size: 200MB. Files can also be referenced by absolute path in analysis tools, bypassing the need to upload. For files outside the samples directory, pass the full path to get_file_info, analyze_file, or run_tool.

download_from_url

Download a file from a URL into the samples directory for analysis. Returns file metadata (hashes, type, size). Supports custom HTTP headers and an optional thug mode for sites requiring JavaScript execution.

download_file

Download a file from the output directory (returns base64-encoded content). Use this to retrieve analysis results. Files are wrapped in a password-protected archive by default to prevent AV/EDR triggers. Pass archive: false for harmless files like text reports. Provide output_path to save directly to the host filesystem.

analyze_file

Auto-analyze a file using REMnux tools appropriate for the detected file type. Runs file to detect type, then executes matching tools (e.g., PE → peframe/capa, PDF → pdfid/pdf-parser, Office → olevba/oleid). Use depth to control analysis intensity: 'quick' (triage only), 'standard' (default), 'deep' (includes expensive tools). Note: 'standard' is sufficient for most files; use 'deep' only when standard doesn't reveal enough.

suggest_tools

Detect file type and return recommended REMnux analysis tools without executing them. Use this to plan an analysis strategy, then run individual tools with run_tool. Returns tool names, descriptions, depth tiers, and expert analysis hints.

extract_iocs

Extract IOCs (IPs, domains, URLs, hashes, registry keys, etc.) from text. Pass output from run_tool or analyze_file to identify indicators. Works well with Volatility 3 plugin output (netscan, cmdline, filescan). Returns deduplicated IOCs with confidence scores.

get_tool_help

Get usage help for a REMnux tool. Returns the tool's --help output so you can understand available flags, options, and usage patterns.

check_tools

Check which REMnux analysis tools are installed and available. Returns a summary of installed vs missing tools across all file type categories.

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription
toolsAll registered REMnux analysis tools with metadata
Tools tagged "apk"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "autoit"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "capabilities"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "cobalt-strike"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "crypto"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "data-exe"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "decompilation"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "decryption"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "dotnet"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "elf"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "email"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "fallback"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "family-detection"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "jar"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "javascript"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "macros"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "memory"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "metadata"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "ole2"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "onenote"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "ooxml"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "packer-detection"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "pcap"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "pdf"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "pe"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "python"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "rtf"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "script"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "shellcode"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "strings"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "triage"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "unpacking"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
Tools tagged "yara"REMnux tools filtered by tag (pe, pdf, ole2, etc.)
peframeStatically analyze PE and Microsoft Office files.
diecDetermine types of files and examine file properties.
capaIdentify capabilities in executable files using CAPA rules.
capa-vvIdentify capabilities with verbose rule match details (addresses and evidence).
flossExtract and deobfuscate strings from PE executables.
pestrExtract ASCII and Unicode strings from PE files with section and offset info.
portexStatically analyze PE files for anomalies, structure, and metadata.
yara-forgeScan for malware family signatures using curated YARA rules from 45+ sources (Malpedia, ReversingLabs, etc.). Matches indicate resemblance to known families, not confirmed attribution.
yara-rulesScan a file with YARA rules to identify capabilities and behaviors (packer detection, anti-debug, networking).
pecheckAnalyze static properties of PE files.
disitoolExamine and manipulate embedded Authenticode digital signatures in PE files.
pescanScan PE files for anomalies and notable indicators.
signsrchFind patterns of common encryption, compression, or encoding algorithms.
ilspycmdDecompile .NET assemblies to C# source code.
monodis-presourcesList embedded manifest resources in a .NET assembly (names and offsets).
monodis-mresourcesExtract all embedded managed resources from a .NET assembly to the current directory.
autoit-ripperExtract and decompile AutoIt scripts from compiled executables.
upx-decompressDecompress UPX-packed executables in-place (keeps backup as .exe~).
manalyzeStatically analyze PE files for imports, resources, and anomalies.
1768Analyze Cobalt Strike beacons and extract configuration details.
cs-decrypt-metadataDecrypt and analyze Cobalt Strike beacon metadata.
csceExtract Cobalt Strike beacon configuration from raw shellcode or memory dumps.
pedumpStatically analyze PE files and extract their components.
dotnetfile_dumpAnalyze static properties of .NET files.
brxorBruteforce XOR-encoded strings to find English words.
pdfidIdentify notable elements of a PDF file.
pdfid-detailedIdentify notable elements of a PDF file (detailed names output).
pdf-parserExamine elements and structure of a PDF file.
pdftoolAnalyze incremental updates in PDF files to detect hidden payload swaps.
pdfresurrectExtract previous versions of content from PDF files.
peepdf-3Examine elements of a PDF file for notable content.
qpdfDecrypt password-protected or permission-locked PDF files.
pdftkManipulate PDF files: merge, split, decrypt, repair, and extract metadata.
pdfcopDetect malicious PDF structures using policy-based heuristics.
pdfextractExtract JavaScript, attachments, fonts, images, and streams from PDF.
pdfdecompressDecompress PDF streams to reveal obfuscated content.
oleidAnalyze OLE2 files for risk indicators (macros, encryption, etc.).
olevbaExtract and analyze VBA macros from Microsoft Office documents.
oledumpAnalyze OLE2 Structured Storage files.
msoffcrypto-crackAttempt to recover the password of encrypted Microsoft Office documents.
pcodedmpDisassemble VBA p-code from Office documents.
xlmdeobfuscatorDeobfuscate Excel 4.0 (XLM) macros.
zipdumpAnalyze zip-compressed files including OOXML and JAR.
xmldumpFormat and analyze XML. For OOXML: zipdump.py -s <n> -d file | xmldump.py pretty
rtfdumpAnalyze RTF files for embedded content.
rtfobjExtract embedded objects from RTF files.
redressAnalyze Go binaries to recover package names, type definitions, source structure, and compiler version.
readelf-headerDisplay ELF file header information.
readelf-sectionsDisplay ELF section headers.
js-beautifyBeautify and deobfuscate JavaScript, CSS, and HTML files.
box-jsAnalyze and deobfuscate JavaScript in a sandbox.
jstilleryDeobfuscate JavaScript using AST-based partial evaluation.
spidermonkeyExecute JavaScript with SpiderMonkey engine using browser/PDF object emulation.
stringsExtract printable ASCII strings from binary files. For Unicode (UTF-16), use 'strings -e l <file>' (little-endian) or 'strings -e b <file>' (big-endian). For PE files, prefer pestr which extracts both automatically.
decode-vbeDecode VBE-encoded VBScript files to readable source.
base64dumpLocate and decode Base64 and other encoded strings.
pycdcDecompile Python bytecode (.pyc) to readable source code.
uncompyle6Decompile Python bytecode (.pyc) to source code. Supports Python 1.0 through 3.8.
pyinstxtractor-ngExtract contents of PyInstaller executables without requiring a matching Python version.
cfrDecompile Java class files and JARs to readable Java source code.
emldumpAnalyze and extract content from email (EML) files.
msgconvertConvert Outlook MSG files to standard EML format.
onedumpAnalyze OneNote documents and extract embedded files.
apkidIdentify compilers, packers, and obfuscators used to protect Android APK and DEX files.
apktoolReverse-engineer Android APK files.
droidlysisPerform static analysis of Android applications.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/REMnux/remnux-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server