Skip to main content
Glama

MalwareAnalyzerMCP

strings

Extract printable strings from files for malware analysis, with options to set minimum length and specify encoding to uncover hidden data and patterns.

Instructions

Extract printable strings from a file

Example usage:

  • Basic strings extraction: { "target": "suspicious.exe" }
  • With minimum length: { "target": "suspicious.exe", "minLength": 10 }
  • With encoding: { "target": "suspicious.exe", "encoding": "l" }

Input Schema

NameRequiredDescriptionDefault
encodingNoString encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)
minLengthNoMinimum string length to display
optionsNoAdditional command-line options
targetYesTarget file or data to analyze

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "encoding": { "description": "String encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)", "enum": [ "s", "S", "b", "l", "B", "L" ], "type": "string" }, "minLength": { "description": "Minimum string length to display", "type": "number" }, "options": { "description": "Additional command-line options", "type": "string" }, "target": { "description": "Target file or data to analyze", "minLength": 1, "type": "string" } }, "required": [ "target" ], "type": "object" }

You must be authenticated.

Other Tools from MalwareAnalyzerMCP

Related Tools

    MCP directory API

    We provide all the information about MCP servers via our MCP API.

    curl -X GET 'https://glama.ai/api/mcp/v1/servers/abdessamad-elamrani/MalwareAnalyzerMCP'

    If you have feedback or need assistance with the MCP directory API, please join our Discord server