Rust MCP server for binary analysis and reverse engineering.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-kirkderp-rbinmcp": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Rust MCP server for binary analysis and reverse engineering.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in other
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Official Miro MCP server - Supports context to code and creating diagrams, docs, and data tables.
MCP server for using the GitLab API
MCP Security Weekly
Get CVE alerts and security updates for io.github.kirkderp/rbinmcp and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Death to Malware.
rbinmcp is Rogue Binary Model Context Protocol (MCP): a Docker-packaged binary analysis lab that AI agents can call as tools. It is built for reverse engineering, malware triage, and artifact comparison, with compact responses that let an agent start cheap and ask for heavier evidence only when it needs it.
Instead of asking an agent to juggle local installs of radare2, Ghidra, ILSpy, binutils, and helper scripts, rbinmcp ships them together behind one MCP server. The tools are shaped for investigation: quick triage first, then focused r2, Ghidra, ILSpy, native, and Rust-backed views.
Public documentation: Rogue Binary Wiki
| Need | What rbinmcp gives your agent |
|---|---|
| Unknown binary triage | Hashes, format, imports, strings, functions, and first-pass graph context |
| Deeper reverse engineering | Focused r2 and Ghidra views without dumping whole projects into context |
| Managed .NET inspection | ILSpy-backed inventory, search, member views, C#, and focused IL |
| Repeatable runtime | Docker image with the same backends, scripts, cache paths, and tool versions |
| Long outputs | Bounded responses with summaries, previews, and cache-backed overflow |
Rogue Binary MCP runs through Docker, but you do not need to learn Docker to use it. Docker is just how your AI app starts the analysis server.
rbinmcp tools.The registry name is:
io.github.kirkderp/rbinmcp
The Docker image is:
ghcr.io/kirkderp/rbinmcp:1.1.0
Optional check that Docker can fetch the image:
docker pull ghcr.io/kirkderp/rbinmcp:1.1.0
Optional check that the image starts:
docker run --rm ghcr.io/kirkderp/rbinmcp:1.1.0 --version
If your AI app supports the MCP registry, add:
io.github.kirkderp/rbinmcp
Some clients still ask for a command and arguments. In that case, use Docker as the MCP server launcher. Replace /absolute/path/to/samples with the folder that contains the files you want the agent to analyze.
Mounts used below:
| Mount | Purpose |
|---|---|
/absolute/path/to/samples:/samples:ro | Gives the server read-only access to your samples |
rbinmcp-cache:/cache/rbinmcp | Keeps Ghidra cache, r2 state, and large-output overflow between runs |
claude mcp add rbinmcp -- \
docker run --rm -i \
-v /absolute/path/to/samples:/samples:ro \
-v rbinmcp-cache:/cache/rbinmcp \
ghcr.io/kirkderp/rbinmcp:1.1.0
Then run /mcp in Claude Code and confirm rbinmcp is connected.
Add this to your MCP server c