Skip to main content
Glama

MalwareAnalyzerMCP

hexdump

Analyze and display file contents in hexadecimal format for malware inspection. Customize output with length limits or offsets to examine specific file sections.

Instructions

Display file contents in hexadecimal format

Example usage:

  • Standard hexdump: { "target": "suspicious.exe" }
  • With length limit: { "target": "suspicious.exe", "length": 256 }
  • With offset: { "target": "suspicious.exe", "offset": 1024 }

Input Schema

NameRequiredDescriptionDefault
lengthNoNumber of bytes to display
offsetNoStarting offset in the file
optionsNoAdditional command-line options
targetYesTarget file or data to analyze

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "length": { "description": "Number of bytes to display", "type": "number" }, "offset": { "description": "Starting offset in the file", "type": "number" }, "options": { "description": "Additional command-line options", "type": "string" }, "target": { "description": "Target file or data to analyze", "minLength": 1, "type": "string" } }, "required": [ "target" ], "type": "object" }

You must be authenticated.

Other Tools from MalwareAnalyzerMCP

Related Tools

    MCP directory API

    We provide all the information about MCP servers via our MCP API.

    curl -X GET 'https://glama.ai/api/mcp/v1/servers/abdessamad-elamrani/MalwareAnalyzerMCP'

    If you have feedback or need assistance with the MCP directory API, please join our Discord server