Skip to main content
Glama

MalwareAnalyzerMCP

objdump

Analyze and extract details from object files, including file headers, section headers, and disassembled code, for malware analysis and debugging purposes.

Instructions

Display information from object files

Example usage:

  • Display file headers: { "target": "suspicious.o" }
  • Disassemble code: { "target": "suspicious.exe", "disassemble": true }
  • Show section headers: { "target": "suspicious.exe", "headers": true }

Input Schema

NameRequiredDescriptionDefault
disassembleNoDisassemble executable sections
headersNoDisplay the contents of the section headers
optionsNoAdditional command-line options
targetYesTarget file or data to analyze

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "disassemble": { "description": "Disassemble executable sections", "type": "boolean" }, "headers": { "description": "Display the contents of the section headers", "type": "boolean" }, "options": { "description": "Additional command-line options", "type": "string" }, "target": { "description": "Target file or data to analyze", "minLength": 1, "type": "string" } }, "required": [ "target" ], "type": "object" }

Other Tools from MalwareAnalyzerMCP

Related Tools

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/abdessamad-elamrani/MalwareAnalyzerMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server