<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Mcp on NTNINJA</title><link>https://ntninja.com/tags/mcp/</link><description>Recent content in Mcp on NTNINJA</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Ryan Johnson</copyright><lastBuildDate>Thu, 05 Mar 2026 01:00:00 +0000</lastBuildDate><atom:link href="https://ntninja.com/tags/mcp/index.xml" rel="self" type="application/rss+xml"/><item><title>dnre-mcp 0.1.0 — .NET Reverse Engineering via MCP</title><link>https://ntninja.com/posts/dnre-mcp-release/</link><pubDate>Thu, 05 Mar 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/dnre-mcp-release/</guid><description>&lt;p&gt;I just released &lt;a href="https://ntninja.com/dnre-mcp/" &gt;dnre-mcp&lt;/a&gt; 0.1.0, a standalone MCP server for .NET assembly reverse engineering and decompilation.&lt;/p&gt;

&lt;h2 class="relative group"&gt;What It Does
 &lt;div id="what-it-does" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#what-it-does" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;dnre-mcp lets AI assistants load, inspect, and decompile .NET assemblies directly through the Model Context Protocol. It exposes 10 tools covering assembly loading, type and method discovery, namespace browsing, and full C# source decompilation. Under the hood it uses ICSharpCode.Decompiler, the same engine that powers ILSpy.&lt;/p&gt;</description></item><item><title>WEDP 1.0.0-rc1 and dbgeng-mcp 0.1.0</title><link>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</link><pubDate>Thu, 12 Feb 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</guid><description>&lt;p&gt;Quick update on two projects that have been getting a lot of my attention lately.&lt;/p&gt;

&lt;h2 class="relative group"&gt;WEDP 1.0.0-rc1
 &lt;div id="wedp-100-rc1" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#wedp-100-rc1" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://ntninja.com/wedp/" &gt;WEDP (Windows Exploit Development Plugin)&lt;/a&gt; has hit its first release candidate.
If you are not familiar with it, WEDP is a native WinDbg extension I built for exploit development workflows.
It provides ROP/SEH/stack-pivot gadget search, cyclic pattern utilities, module protection enumeration, inline assembly, and a bunch of other stuff you would normally need multiple tools for.
I wrote a &lt;a href="https://ntninja.com/posts/windbg-mcp-with-wedp/" &gt;post&lt;/a&gt; recently on using it with an MCP server and that really pushed me to clean things up and get a proper release out.&lt;/p&gt;</description></item></channel></rss>