<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse Engineering on NTNINJA</title><link>https://ntninja.com/categories/reverse-engineering/</link><description>Recent content in Reverse Engineering on NTNINJA</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Ryan Johnson</copyright><lastBuildDate>Thu, 05 Mar 2026 01:00:00 +0000</lastBuildDate><atom:link href="https://ntninja.com/categories/reverse-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>dnre-mcp 0.1.0 — .NET Reverse Engineering via MCP</title><link>https://ntninja.com/posts/dnre-mcp-release/</link><pubDate>Thu, 05 Mar 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/dnre-mcp-release/</guid><description>&lt;p&gt;I just released &lt;a href="https://ntninja.com/dnre-mcp/" &gt;dnre-mcp&lt;/a&gt; 0.1.0, a standalone MCP server for .NET assembly reverse engineering and decompilation.&lt;/p&gt;

&lt;h2 class="relative group"&gt;What It Does
 &lt;div id="what-it-does" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#what-it-does" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;dnre-mcp lets AI assistants load, inspect, and decompile .NET assemblies directly through the Model Context Protocol. It exposes 10 tools covering assembly loading, type and method discovery, namespace browsing, and full C# source decompilation. Under the hood it uses ICSharpCode.Decompiler, the same engine that powers ILSpy.&lt;/p&gt;</description></item></channel></rss>