MCP Server
DIE MCP Server
An MCP server that enables AI agents to analyze executable files using Detect It Easy (DIE), providing capabilities to examine file structures, detect packers, compilers, and gather other forensic information.
7
GitHub Stars
8/22/2025
Last Updated
No Configuration
Please check the documentation below.
README Documentation
DIE (Detect It Easy) MCP Server
Overview
This project provides an MCP (Model Context Protocol) server that allows AI agents to use Detect It Easy (DIE) to analyze executable files. The server acts as a bridge between AI models and the DIE command-line tool.
Server Structure
die_server.py
- Main MCP server implementationrequirements.txt
- Project dependenciesexamples/
- Optional example clients and usage demonstrations
Quick Start
- Install DIE (Detect It Easy) command-line tool
- Install dependencies:
pip install -r requirements.txt
- Run the server:
python die_server.py --die-path "path/to/diec.exe" --transport stdio
Server Options
--transport {stdio,sse}
: Transport mode (stdio or sse). Default: stdio--host HOST
: Host to bind to (for SSE mode). Default: 0.0.0.0--port PORT
: Port to listen on (for SSE mode). Default: 8080--die-path DIE_PATH
: Path to the DIE command-line executable (diec.exe)
Available MCP Tools
The server exposes these DIE functionalities through MCP:
analyze_file
Analyzes an executable file with DIE.
{
"file_path": "path/to/file",
"json_output": true,
"deep_scan": false,
"entropy": false,
"verbose": false
}
show_special_info
Gets special file info for a specific method.
{
"file_path": "path/to/file",
"method": "Hash" # or other methods like "Entropy", "Info"
}
list_available_methods
Lists all available special methods for a file.
{
"file_path": "path/to/file"
}
Example Usage
See the examples/
directory for sample clients and usage demonstrations.
Quick Actions
Key Features
Model Context Protocol
Secure Communication
Real-time Updates
Open Source