REMnux MCP Server▌

by REMnux
REMnux MCP Server: Run REMnux malware analysis via Docker, SSH or locally with automated file-type analysis, sandbox too
Enables AI assistants to execute malware analysis tools on a REMnux system via Docker, SSH, or local connections. It provides automated file-type analysis, structured tool discovery, and security guardrails for streamlined malware investigation.
best for
- / Malware analysts investigating suspicious files
- / Security researchers conducting reverse engineering
- / Incident response teams analyzing threats
- / Students learning malware analysis techniques
capabilities
- / Execute malware analysis tools on REMnux systems
- / Suggest appropriate tools based on file type
- / Run automated tool chains with structured output
- / Extract indicators of compromise (IOCs)
- / Connect to REMnux via Docker, SSH, or local deployment
- / Apply security guardrails to prevent dangerous commands
what it does
Enables AI assistants to execute malware analysis tools on a REMnux system via Docker, SSH, or local connections, with automated file-type analysis and security guardrails.
about
REMnux MCP Server is an official MCP server published by REMnux that provides AI assistants with tools and capabilities via the Model Context Protocol. REMnux MCP Server: Run REMnux malware analysis via Docker, SSH or locally with automated file-type analysis, sandbox too It is categorized under auth security, developer tools.
how to install
You can install REMnux MCP Server in your AI client of choice. Use the install panel on this page to get one-click setup for Cursor, Claude Desktop, VS Code, and other MCP-compatible clients. This server runs locally on your machine via the stdio transport.
license
GPL-3.0
REMnux MCP Server is released under the GPL-3.0 license.
readme
REMnux MCP Server: Run REMnux malware analysis via Docker, SSH or locally with automated file-type analysis, sandbox too
TL;DR: Enables AI assistants to execute malware analysis tools on a REMnux system via Docker, SSH, or local connections, with automated file-type analysis and security guardrails.
What it does
- Execute malware analysis tools on REMnux systems
- Suggest appropriate tools based on file type
- Run automated tool chains with structured output
- Extract indicators of compromise (IOCs)
- Connect to REMnux via Docker, SSH, or local deployment
- Apply security guardrails to prevent dangerous commands
Best for
- Malware analysts investigating suspicious files
- Security researchers conducting reverse engineering
- Incident response teams analyzing threats
- Students learning malware analysis techniques
Highlights
- Three flexible deployment scenarios
- Built-in malware analysis expertise
- Uses neutral language to reduce confirmation bias