Skip to content

yfe404/triton-mcp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Triton MCP

triton-mcp is a Python MCP server focused on ARM reverse engineering for heavily obfuscated binaries.

Scope

  • Architectures: AArch64, ARMv7, Thumb2
  • Binary format: ELF
  • Workflows:
    • end-to-end deobfuscation pipeline
    • granular analysis tools (lifting, slicing, simplification, CFG recovery)
    • patch synthesis, validation, apply, and rollback
    • trace import and Frida-based capture entrypoint
  • Transport: stdio MCP

Install

python -m venv .venv
source .venv/bin/activate
pip install -e ".[dev]"

Run MCP Server

triton-mcp

Or:

python -m triton_mcp.server

Exposed MCP Tools

  • start_session
  • close_session
  • load_binary
  • import_trace
  • capture_trace_frida
  • lift_block
  • slice_symbolic
  • simplify_expression
  • detect_obfuscation
  • recover_cfg
  • synthesize_patch
  • validate_patch
  • apply_patch
  • rollback_patch
  • list_patch_transactions
  • explain_findings
  • analyze_pipeline

Tests

pip install -e ".[dev]"
pytest -q

Local Workflows

Use Makefile targets for either package manager:

make install-pip
make test-pip
make run-pip
make install-uv
make test-uv
make run-uv

Tool API Reference

See docs/MCP_TOOLS.md for method-level request/response examples and constraints.

Notes

  • Triton bindings are optional at import time. If unavailable, the server runs with reduced symbolic fidelity.
  • Addresses in patch operations are currently treated as file offsets for deterministic local workflows.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors