triton-mcp is a Python MCP server focused on ARM reverse engineering for heavily obfuscated binaries.
- Architectures: AArch64, ARMv7, Thumb2
- Binary format: ELF
- Workflows:
- end-to-end deobfuscation pipeline
- granular analysis tools (lifting, slicing, simplification, CFG recovery)
- patch synthesis, validation, apply, and rollback
- trace import and Frida-based capture entrypoint
- Transport: stdio MCP
python -m venv .venv
source .venv/bin/activate
pip install -e ".[dev]"triton-mcpOr:
python -m triton_mcp.serverstart_sessionclose_sessionload_binaryimport_tracecapture_trace_fridalift_blockslice_symbolicsimplify_expressiondetect_obfuscationrecover_cfgsynthesize_patchvalidate_patchapply_patchrollback_patchlist_patch_transactionsexplain_findingsanalyze_pipeline
pip install -e ".[dev]"
pytest -qUse Makefile targets for either package manager:
make install-pip
make test-pip
make run-pipmake install-uv
make test-uv
make run-uvSee docs/MCP_TOOLS.md for method-level request/response examples and constraints.
- Triton bindings are optional at import time. If unavailable, the server runs with reduced symbolic fidelity.
- Addresses in patch operations are currently treated as file offsets for deterministic local workflows.