MalwareAnalyzerMCP

strings

Extract printable strings from files for malware analysis, with options to set minimum length and specify encoding to uncover hidden data and patterns.

Instructions

Extract printable strings from a file

Example usage:

  • Basic strings extraction: { "target": "suspicious.exe" }
  • With minimum length: { "target": "suspicious.exe", "minLength": 10 }
  • With encoding: { "target": "suspicious.exe", "encoding": "l" }

Input Schema

NameRequiredDescriptionDefault
encodingNoString encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)
minLengthNoMinimum string length to display
optionsNoAdditional command-line options
targetYesTarget file or data to analyze

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "encoding": { "description": "String encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)", "enum": [ "s", "S", "b", "l", "B", "L" ], "type": "string" }, "minLength": { "description": "Minimum string length to display", "type": "number" }, "options": { "description": "Additional command-line options", "type": "string" }, "target": { "description": "Target file or data to analyze", "minLength": 1, "type": "string" } }, "required": [ "target" ], "type": "object" }

You must be authenticated.

Other Tools from MalwareAnalyzerMCP

Related Tools

    ID: v6v1ohhw7v