First pass
Start with hashes, file shape, imports, sections, strings, hardening posture, call structure, and likely behavior families before opening heavier tools.
Rogue Binary builds practical reverse engineering tools for analysts and agents. The first release is rbinmcp: a Rust MCP server for binary triage, static parsing, Ghidra, radare2, and native command wrappers.
rbinmcp gives an agent the boring parts of binary triage without burning a full decompiler pass first. It keeps hashes, offsets, imports, sections, strings, callsites, and backend output close to the claim, then points the next step at the smallest Ghidra, radare2, or native-tool query that can prove it.
Start with hashes, file shape, imports, sections, strings, hardening posture, call structure, and likely behavior families before opening heavier tools.
Read PE, ELF, and Mach-O metadata. Check export hashes, entropy, packer hints, crypto constants, strings, objdump output, binary diffs, and embedded signatures.
Use cached Ghidra projects and persistent r2 sessions for functions, CFGs, xrefs, callsite facts, byte reads, field flow, path digests, and decompiler views.
Use tool discovery, backend status, source navigation, validation hints, and local Ghidra/r2 reference indexes when working on rbinmcp itself.
Contact
rbinmcp feedback, binary-analysis tooling, malware triage, and private consulting.