Google PageRank for AI agents. 25,000+ tools indexed.

MCPEmulate by LabGuy94

#697 of 1672 by LabGuy94
35 score

An MCP server that provides CPU emulation, disassembly, and assembly tools for LLM agents across multiple architectures including x86, ARM, and RISC-V. It enables agents to manage isolated emulation sessions, perform memory analysis, hook syscalls, and trace execution through a standard tool interface.

Ranked #697 out of 1672 indexed tools.Actively maintained with commits in the last week.
🔑
Is this your tool? Claim this listing to add maintainer context, get a verified badge, and unlock analytics.
Claim listing →

Signal Breakdown

Installs 0
Freshness today
Issue Health 50%
Stars 2
Platform Breadth 1 platform
Contributors 1
Description Detailed

How to Improve

Contributors medium impact

Single-contributor projects carry bus-factor risk — welcoming contributors boosts confidence

Stars low impact

Low star count — promote the project, write docs, and engage the community to drive adoption

Platforms medium impact

Only 1 platform listed — publishing to more platforms improves your score

Badge

AgentRank score for MCPEmulate by LabGuy94
[![AgentRank](https://agentrank-ai.com/api/badge/skill/glama-LabGuy94--MCPEmulate)](https://agentrank-ai.com/skill/glama-LabGuy94--MCPEmulate/?utm_source=badge&utm_medium=readme&utm_campaign=agentrank_badge)
<a href="https://agentrank-ai.com/skill/glama-LabGuy94--MCPEmulate/?utm_source=badge&utm_medium=readme&utm_campaign=agentrank_badge"><img src="https://agentrank-ai.com/api/badge/skill/glama-LabGuy94--MCPEmulate" alt="AgentRank"></a>

Supported Platforms

MCP

From the README

# MCPEmulate

> This project was vibecoded.

An [MCP](https://modelcontextprotocol.io/) server that exposes CPU emulation, disassembly, and assembly as tools for LLM agents. Built on [Unicorn](https://www.unicorn-engine.org/) (emulation), [Capstone](https://www.capstone-engine.org/) (disassembly), [Keystone](https://www.keystone-engine.org/) (assembly), and [LIEF](https://lief-project.github.io/) (binary parsing).

Agents can create isolated emulation sessions, load code or full executables, set breakpoints, hook syscalls, step through instructions, inspect memory and registers, and diff execution traces -- all through the standard MCP tool interface.

## Supported Architectures

| Architecture | Emulation | Disassembly | Assembly | Syscall Hooking |
|---|---|---|---|---|
| x86 (32-bit) | Yes | Yes | Yes | `int 0x80` |
| x86-64 | Yes | Yes | Yes | `syscall` |
| ARM (32-bit) | Yes | Yes | Yes | `svc 0` |
| AArch64 | Yes | Yes | Yes | `svc 0` |
| MIPS32 (LE) | Yes | Yes | Yes | `syscall`
Read full README on GitHub →