Skip to main content
Glama

MalwareAnalyzerMCP

strings

Extract and analyze printable strings from files for malware analysis. Specify minimum length, encoding, and additional options to customize the output.

Instructions

Extract printable strings from a file

Example usage:

  • Basic strings extraction: { "target": "suspicious.exe" }
  • With minimum length: { "target": "suspicious.exe", "minLength": 10 }
  • With encoding: { "target": "suspicious.exe", "encoding": "l" }

Input Schema

NameRequiredDescriptionDefault
encodingNoString encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)
minLengthNoMinimum string length to display
optionsNoAdditional command-line options
targetYesTarget file or data to analyze

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "encoding": { "description": "String encoding (s=7-bit, S=8-bit, b=16-bit big-endian, l=16-bit little-endian, etc.)", "enum": [ "s", "S", "b", "l", "B", "L" ], "type": "string" }, "minLength": { "description": "Minimum string length to display", "type": "number" }, "options": { "description": "Additional command-line options", "type": "string" }, "target": { "description": "Target file or data to analyze", "minLength": 1, "type": "string" } }, "required": [ "target" ], "type": "object" }

Other Tools from MalwareAnalyzerMCP

Related Tools

  • @abdessamad-elamrani/MalwareAnalyzerMCP
  • @abdessamad-elamrani/MalwareAnalyzerMCP
  • @abdessamad-elamrani/MalwareAnalyzerMCP
  • @bsmi021/mcp-file-operations-server
  • @abdessamad-elamrani/MalwareAnalyzerMCP
  • @fdrechsler/mcp-server-idapro

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/abdessamad-elamrani/MalwareAnalyzerMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server