by icloudza · MCP Server · ★ 34
ARM64 trace evidence analysis & cipher algorithm recovery — Claude Desktop plugin with skills + local MCP server driving the native ak_search engine over GB-scale trace files
| Stars | 34 |
| Forks | 13 |
| Language | Python |
| Category | MCP Server |
| License | MIT |
| Quality Score | 41.25/100 |
| Last Updated | 2026-05-14 |
| Created | 2026-05-11 |
| Platforms | claude-code, mcp, python |
| Est. Tokens | ~40k |
Explore other popular mcp server tools:
algokiller-plugin is ARM64 trace evidence analysis & cipher algorithm recovery — Claude Desktop plugin with skills + local MCP server driving the native ak_search engine over GB-scale trace files. It is categorized as a MCP Server with 34 GitHub stars.
algokiller-plugin is primarily written in Python. It covers topics such as arm64, binary-analysis, claude-code.
You can find installation instructions and usage details in the algokiller-plugin GitHub repository at github.com/icloudza/algokiller-plugin. The project has 34 stars and 13 forks, indicating an active community.
algokiller-plugin is released under the MIT license, making it free to use and modify according to the license terms.