Exploit a binary using your LLM
Best MCP for binary exploitation, reverse engineering, and more.
we're the only MCP that do things dynamically.
Latest AutoGDB demo showcasing recent features.
AutoGDB's MCP works in a special way. It use a SaaS-ish way to establish client-server-client communication, in order for that to work, I did some reworking and tweaking on the original MCP SSE Protocols session pool (if you look closely, you can see the AutoGDB's MCP actually use SSE URL Paramter to connect). Which allows you to deploy AutoGDB in one GDB, and use it anywhere.
GDB plugin <--> command middleware <-> backend <-> MCP Backend <-> your LLM
One-line installation using curl:
curl -s http://apollo.autogdb.io/download/autogdb.py > ~/.autogdb.py && echo "# AutoGDB MCP Config" >> ~/.gdbinit && echo "source ~/.autogdb.py" >> ~/.gdbinit
In your GDB session (after installing the plugin):
autogdb connect http://apollo.autogdb.io YOUR_CONNECTION_ID
Generate a Connection ID above first.
Install the `mcp-proxy` tool and configure your LLM client (like Cursor) to connect.
1. Install Proxy
Install `mcp-proxy` using one of the following methods:
uv tool install mcp-proxy
After installation, find the executable path (e.g., using `which mcp-proxy` or `uv tool run -- mcp-proxy --version`).
2. Connect LLM Client
Configure your LLM client's MCP settings (e.g., in Claude's `claude_desktop_config.json`).
"mcpServers": {
"autogdb": {
"command": "/replace/with/path/to/mcp-proxy",
"args": ["http://apollo.autogdb.io/sse?auth=YOUR_CONNECTION_ID"]
}
}
Make sure to replace the placeholder path if you don't enter it above.
This a MVP version of AutoGDB.
- If you like AutoGDB, join the Discord server!
- AutoGDB is looking forward to collaborations!
- AutoGDB is still in MVP stage, feel free to make percious suggestions.
- The MCP via SSE is available, but yet only OpenAI Agent SDK / Cursor supports it.
Frequently Asked Questions
Contact:
everything: retr0@autogdb.com
improvments: improv@autogdb.com
security: security@autogdb.com