MCP Server for Cutter
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"cuttermcp-plus": {
"args": [
"<ABSOLUTE/PATH/TO>/mcp_server.py"
],
"command": "python"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Cutter is a powerful, user-friendly, and completely free reverse engineering tool.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security / developer-tools
A Model Context Protocol (MCP) server and CLI that provides tools for agent use when working on iOS and macOS projects.
XcodeBuildMCP provides tools for Xcode project management, simulator management, and app utilities.
MCP server for using the GitLab API
40+ production-ready SwiftUI recipes for building full-stack iOS apps via MCP.
MCP Security Weekly
Get CVE alerts and security updates for CutterMCP Plus and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.

Automated Reverse Engineering via LLMs
Cutter is a powerful, user-friendly, and completely free reverse engineering tool.
Now, combined with modern Large Language Models (LLMs), they can do even more.
🤖 “Give AI a sharp cutter!”
As demonstrated in the video below, this plugin enables Cutter to automatically solve simple reverse engineering CTF challenges(From hack the box).
The LLM can notice anti-analysis techniques such as illegal instruction ud2. In this case, ud2 jammed the decompiler and produced incomplete result.
claude-sonnet-3.7 noticed this and tried to read the assembly directly to get around it. The entire process took about a minute to find the correct answer, without human intervention.
https://github.com/user-attachments/assets/bc86df16-93e1-473f-8eb4-3161a7b4a48e
(The video has not been accelerated.)
This is a VM analysis challenge. You need to reverse the opcode and figure out the rules. There are functions that are called in key parts via function pointers, so these are not listed by cutter.
So, the more intelligent `claude-opus-4' was used.
With prompt: Let's do a CTF reverse analysis challenge. virtually.mad. this is an ELF file. Cutter MCP is ready for you. You can call cutter to help you complete the challenge.
With no intervention claude-opus-4 completed the challenge using cutter.
It can also assist in malware analysis workflows, helping you accelerate tasks or extract key information.
In my previous project, there was a shellcode loader that achieved a VirusTotal score of 0/72 (ehmm...at that time I mean), but it was unable to withstand analysis by LLMs.
The analysis results from claude-opus-4 are completely correct, and the function has been renamed, a guess has been made: Hey, this is a shellcode loader.
The entire process took a few minutes and also required no human intervention.

list_functions()
function_detail()
list_globals()
list_strings()
list_segments()
list_vars()
list_entry_points()
decompile()
disasm_text()
disasm_json()
disasm_by_func_text()
disasm_by_func_json()
xrefs_to()
rename_function()
rename_local_variable()
set_comment()
set_local_variable_type()
current_address()
current_function()
read_bytes()
First, make sure that cutter and python3 are installed.
pip install -r requirements.txt
requirements.txt is used for the standalone mcp_server.py wrapper.
The Cutter plugin itself is mcp_plugin.py. It now uses Python's standard library HTTP server so it does not require FastAPI, Pydantic, or Starlette inside Cutter's embedded Python.
mcp_plugin.py runs inside Cutter and exposes a local HTTP API that mcp_server.py uses.
Default local endpoints:
http://127.0.0.1:8000/api/v1
http://127.0.0.1:8000/api/v1/health
http://127.0.0.1:8000/docs
mcp_plugin.py to the <cutter_plugins>/python folder(not the mcp_server.py)For example (in cline, cursor etc) in MCP config file.
STDIO mode:
... [View full README on GitHub](https://github.com/restkhz/CutterMCP-plus#readme)