Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Aragornbreak into the target VM and get a stack trace of the current thread"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Aragorn
Direct kernel debugger MCP server for Windows security research. Connects to Windows VM kernels via kdnet and exposes 63 tools over the Model Context Protocol.
This process is the debugger. It spawns kd.exe as a subprocess for kdnet transport, then connects via DebugConnect() for full DbgEng COM access. No WinDbg GUI required.
MCP Client ──stdio/http──► Aragorn ──DebugConnect(TCP)──► kd.exe ──kdnet──► VM kernelQuick Start
# 1. Install dependencies
pip install -r requirements.txt
# 2. Copy DbgEng DLLs from WinDbg Preview into dbgeng_bin/
# (dbgeng.dll, dbghelp.dll, dbgmodel.dll, dbgcore.dll, symsrv.dll, srcsrv.dll)
# 3. Configure
cp .env.example .env
# Edit .env: set KD_CONNECTION, KD_EXE_PATH, etc.
# 4. Run (stdio mode — for MCP clients like Claude Code)
python server.py
# Or HTTP mode (for remote/shared access)
python server.py --http.mcp.json integration
{
"aragorn": {
"type": "stdio",
"command": "python",
"args": ["path/to/Aragorn/server.py"]
}
}Configuration
All settings are via environment variables (or .env file):
Variable | Default | Description |
|
| kdnet connection string |
| WinDbg Preview's kd.exe | Path to kd.exe |
|
| Local TCP port for kd.exe debug server |
|
| Path to DbgEng DLL |
| Microsoft symbol server | Symbol search path |
|
| HTTP mode bind address |
|
| HTTP mode port |
|
| VM agent URL (for workflow tools) |
| (empty) | VM agent API key |
DbgEng Binaries
The dbgeng_bin/ directory is gitignored. Copy these DLLs from your WinDbg Preview installation:
C:\Program Files\WindowsApps\Microsoft.WinDbg_*\amd64\
├── dbgeng.dll
├── dbghelp.dll
├── dbgmodel.dll
├── dbgcore.dll
├── symsrv.dll
└── srcsrv.dllVM Agent
The vm_agent/ directory contains a lightweight Flask server that runs inside the target VM. It exposes process execution, file I/O, and driver service management over HTTP. Aragorn's workflow tools (breakpoint_and_run, vm_exec, etc.) use it to coordinate kernel debugging with VM-side actions.
# On the VM:
cd vm_agent
pip install -r requirements.txt
cp .env.example .env
# Edit .env: set VM_AGENT_API_KEY
python server.pyThe VM agent is optional — all pure debugger tools work without it. You only need it for the coordinated workflow tools.
Tools
Session & Connection (9)
Tool | Description |
| Connect to kernel debugger via kd.exe |
| Cleanly disconnect |
| Get connection state and config |
| Get debug target info (class, processors, page size) |
| Break in, verify context, reload symbols (retries 5x) |
| Lightweight probe without breaking into target |
| Force full reconnect |
| Diagnostic kd.exe connection test |
| Full tracked state for cross-agent coordination |
Multi-Session (6)
Tool | Description |
| Create isolated debugger session for a VM |
| Connect a session's debugger |
| Disconnect without destroying |
| Destroy and clean up a session |
| List all sessions with status |
| Set active session for tool routing |
Command Execution (3)
Tool | Description |
| Execute raw debugger command (e.g., |
| Execute multiple commands sequentially |
| Evaluate expression, return numeric value |
Memory (7)
Tool | Description |
| Read virtual memory (hex/qwords/dwords/ascii) |
| Write bytes to virtual memory |
| Search for byte pattern |
| Read physical memory |
| Write to physical memory |
| Translate virtual to physical address |
| Read Model-Specific Register |
Registers (2)
Tool | Description |
| Read all general-purpose registers |
| Write a register value |
Stack (1)
Tool | Description |
| Get structured stack trace with symbols |
Breakpoints (4)
Tool | Description |
| Set code or data/hardware breakpoint |
| Remove breakpoint by ID |
| List all breakpoints with status |
| Configure exception handling (break/ignore/output) |
Execution Control (4)
Tool | Description |
| Resume execution (robust, retries to drain kdnet breaks) |
| Single-step into calls |
| Single-step over calls |
| Interrupt target execution |
Inspection (4)
Tool | Description |
| List loaded modules with base/size/name |
| List threads with engine/system IDs |
| List processes with engine/system IDs |
| Switch to process context (.process /i) |
Symbols (4)
Tool | Description |
| Bidirectional symbol/address resolution |
| Get struct field byte offset |
| Get type size in bytes |
| Disassemble instructions at address |
Events (3)
Tool | Description |
| Block until next debug event |
| Return queued events without blocking |
| Discard all queued events |
Kernel Objects (8)
Tool | Description |
| Read typed structure (dt equivalent) |
| Get page table entry info |
| Get pool allocation metadata |
| Display driver object + dispatch table |
| Display device object info |
| Display kernel object from object directory |
| Dump System Service Descriptor Table |
| Dump Interrupt Descriptor Table |
Workflow (8)
Tool | Description |
| Atomic: set BP, resume, run VM command, wait for hit, capture state |
| Set logging BPs at multiple addresses, run command, capture trace |
| Batch post-breakpoint inspection commands |
| Execute command on VM |
| Read file from VM |
| Write file to VM |
| Upload file from host to VM |
| Check VM reachability |
Architecture
Aragorn/
├── server.py # FastMCP entry point, registers all tool modules
├── config.py # Environment variable configuration
├── debugger.py # High-level Debugger class (lifecycle, commands, reconnect)
├── dbgeng.py # Pure ctypes COM interface definitions (6 interfaces)
├── callbacks.py # IDebugOutputCallbacks + IDebugEventCallbacks
├── sessions.py # Multi-session registry (parallel VM debugging)
├── vm_client.py # Async HTTP client to VM agent
├── dbgeng_bin/ # DbgEng DLLs (gitignored, ~15MB)
├── vm_agent/ # REST server for target VM (Flask + psutil)
│ ├── server.py # VM agent HTTP server
│ ├── requirements.txt
│ └── .env.example
└── tools/ # MCP tool modules (one per domain)
├── core.py # execute, execute_batch, evaluate
├── session.py # connect, disconnect, status, ensure_ready
├── multi_session.py # session_create/connect/destroy/list
├── memory.py # read/write virtual + physical memory, MSR
├── registers.py # read/write registers
├── stack.py # get_stack
├── breakpoints.py # set/remove/list breakpoints, exception filters
├── execution.py # continue, step_into, step_over, break_in
├── inspection.py # list modules/threads/processes, switch context
├── symbols.py # resolve symbols, field offsets, disassemble
├── events.py # wait/poll/clear debug events
├── kernel.py # read_struct, PTE, pool, driver/device objects, SSDT, IDT
└── workflow.py # breakpoint_and_run, run_and_trace, VM proxy toolsCOM Interface Stack
Aragorn wraps six DbgEng COM interfaces via ctypes (no C++ extension needed):
IDebugClient — Session lifecycle, callback registration
IDebugControl — Command execution, breakpoints, execution status
IDebugDataSpaces2 — Virtual/physical memory, address translation
IDebugRegisters — Register read/write
IDebugSymbols2 — Symbol resolution, type info, disassembly
IDebugSystemObjects — Process/thread/module enumeration
All blocking COM operations are wrapped in asyncio.to_thread() for MCP stdio compatibility. Each session gets a dedicated COM thread (DbgEng has thread affinity).
License
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.