Skip to main content
Glama

MalwareAnalyzerMCP

objdump

Analyze and display detailed information from object files, including disassembled code and section headers, to assist in malware analysis.

Instructions

Display information from object files

Example usage:

  • Display file headers: { "target": "suspicious.o" }
  • Disassemble code: { "target": "suspicious.exe", "disassemble": true }
  • Show section headers: { "target": "suspicious.exe", "headers": true }

Input Schema

NameRequiredDescriptionDefault
disassembleNoDisassemble executable sections
headersNoDisplay the contents of the section headers
optionsNoAdditional command-line options
targetYesTarget file or data to analyze

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "disassemble": { "description": "Disassemble executable sections", "type": "boolean" }, "headers": { "description": "Display the contents of the section headers", "type": "boolean" }, "options": { "description": "Additional command-line options", "type": "string" }, "target": { "description": "Target file or data to analyze", "minLength": 1, "type": "string" } }, "required": [ "target" ], "type": "object" }

You must be authenticated.

Other Tools from MalwareAnalyzerMCP

Related Tools

    MCP directory API

    We provide all the information about MCP servers via our MCP API.

    curl -X GET 'https://glama.ai/api/mcp/v1/servers/abdessamad-elamrani/MalwareAnalyzerMCP'

    If you have feedback or need assistance with the MCP directory API, please join our Discord server