algokiller-plugin

by icloudza · MCP Server · ★ 34

About algokiller-plugin

ARM64 trace evidence analysis & cipher algorithm recovery — Claude Desktop plugin with skills + local MCP server driving the native ak_search engine over GB-scale trace files

arm64binary-analysisclaude-codeclaude-desktopcryptanalysisfridagumtracemcpreverse-engineeringtrace-analysis

Quick Facts

Stars34
Forks13
LanguagePython
CategoryMCP Server
LicenseMIT
Quality Score41.25/100
Last Updated2026-05-14
Created2026-05-11
Platformsclaude-code, mcp, python
Est. Tokens~40k

More MCP Server Tools

Explore other popular mcp server tools:

View all MCP Server tools →

Popular Python Agent Tools

Frequently Asked Questions

What is algokiller-plugin?

algokiller-plugin is ARM64 trace evidence analysis & cipher algorithm recovery — Claude Desktop plugin with skills + local MCP server driving the native ak_search engine over GB-scale trace files. It is categorized as a MCP Server with 34 GitHub stars.

What programming language is algokiller-plugin written in?

algokiller-plugin is primarily written in Python. It covers topics such as arm64, binary-analysis, claude-code.

How do I install or use algokiller-plugin?

You can find installation instructions and usage details in the algokiller-plugin GitHub repository at github.com/icloudza/algokiller-plugin. The project has 34 stars and 13 forks, indicating an active community.

What license does algokiller-plugin use?

algokiller-plugin is released under the MIT license, making it free to use and modify according to the license terms.

View on GitHub → Browse MCP Server tools