Skip to main content
Glama

MalwareAnalyzerMCP

file

Identify and analyze file types using the MCP server to assess potential malware by specifying the target file and optional command-line parameters.

Instructions

Analyze a file and determine its type

Example usage:

  • Basic file identification: { "target": "suspicious.exe" }
  • With options: { "target": "suspicious.exe", "options": "-b" }

Input Schema

NameRequiredDescriptionDefault
optionsNoAdditional command-line options
targetYesTarget file or data to analyze

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "options": { "description": "Additional command-line options", "type": "string" }, "target": { "description": "Target file or data to analyze", "minLength": 1, "type": "string" } }, "required": [ "target" ], "type": "object" }

You must be authenticated.

Other Tools from MalwareAnalyzerMCP

Related Tools

    MCP directory API

    We provide all the information about MCP servers via our MCP API.

    curl -X GET 'https://glama.ai/api/mcp/v1/servers/abdessamad-elamrani/MalwareAnalyzerMCP'

    If you have feedback or need assistance with the MCP directory API, please join our Discord server