Download and extract all dropped files from a Joe Sandbox malware analysis for local inspection. Specify the analysis ID to retrieve files from the analysis run.
Download and extract memory dumps from Joe Sandbox malware analysis for forensic investigation. Retrieves raw memory snapshots captured during execution and saves them to a local directory.
Retrieve AI-generated reasoning summaries for specific malware analysis runs from Joe Sandbox to understand detection insights and behavioral analysis results.
Retrieve AI-generated analysis summaries for specific malware analysis runs from Joe Sandbox Cloud to understand threat behavior across different system environments.
Enables transcription of YouTube videos to extract video titles, full transcripts, thumbnail URLs, and video IDs. Built with pocket-joe and deployable to Railway for scalable MCP server hosting.
A Model Context Protocol (MCP) server for interacting with Joe Sandbox Cloud.
This server exposes rich analysis and IOC extraction capabilities from Joe Sandbox and integrates cleanly into any MCP-compatible application (e.g. Claude Desktop, Glama, or custom LLM agents).
An MCP server that enables coding agents to execute and manage long-running shell commands asynchronously with capabilities for process monitoring, interaction, and lifecycle management.