<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Genai on NTNINJA</title><link>https://ntninja.com/categories/genai/</link><description>Recent content in Genai on NTNINJA</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Ryan Johnson</copyright><lastBuildDate>Thu, 05 Mar 2026 01:00:00 +0000</lastBuildDate><atom:link href="https://ntninja.com/categories/genai/index.xml" rel="self" type="application/rss+xml"/><item><title>dnre-mcp 0.1.0 — .NET Reverse Engineering via MCP</title><link>https://ntninja.com/posts/dnre-mcp-release/</link><pubDate>Thu, 05 Mar 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/dnre-mcp-release/</guid><description>&lt;p&gt;I just released &lt;a href="https://ntninja.com/dnre-mcp/" &gt;dnre-mcp&lt;/a&gt; 0.1.0, a standalone MCP server for .NET assembly reverse engineering and decompilation.&lt;/p&gt;

&lt;h2 class="relative group"&gt;What It Does
 &lt;div id="what-it-does" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#what-it-does" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;dnre-mcp lets AI assistants load, inspect, and decompile .NET assemblies directly through the Model Context Protocol. It exposes 10 tools covering assembly loading, type and method discovery, namespace browsing, and full C# source decompilation. Under the hood it uses ICSharpCode.Decompiler, the same engine that powers ILSpy.&lt;/p&gt;</description></item><item><title>WEDP 1.0.0-rc1 and dbgeng-mcp 0.1.0</title><link>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</link><pubDate>Thu, 12 Feb 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</guid><description>&lt;p&gt;Quick update on two projects that have been getting a lot of my attention lately.&lt;/p&gt;

&lt;h2 class="relative group"&gt;WEDP 1.0.0-rc1
 &lt;div id="wedp-100-rc1" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#wedp-100-rc1" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://ntninja.com/wedp/" &gt;WEDP (Windows Exploit Development Plugin)&lt;/a&gt; has hit its first release candidate.
If you are not familiar with it, WEDP is a native WinDbg extension I built for exploit development workflows.
It provides ROP/SEH/stack-pivot gadget search, cyclic pattern utilities, module protection enumeration, inline assembly, and a bunch of other stuff you would normally need multiple tools for.
I wrote a &lt;a href="https://ntninja.com/posts/windbg-mcp-with-wedp/" &gt;post&lt;/a&gt; recently on using it with an MCP server and that really pushed me to clean things up and get a proper release out.&lt;/p&gt;</description></item><item><title>WinDBG MCP with WEDP</title><link>https://ntninja.com/posts/windbg-mcp-with-wedp/</link><pubDate>Fri, 06 Feb 2026 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/windbg-mcp-with-wedp/</guid><description>&lt;p&gt;I have been late to the game with adopting GenAI into my workflow, but we are at full steam now.
I have slowly been adding it into my daily routines to see where I can gain efficiency leveraging this new tech.
One of the big areas I am playing with right now is for writing Windows based CTF challenges, and now in the past few days, seeing how I can leverage GenAI for writing POCs for these new challenges.
In this post we are going to walk through my initial setup for using the &lt;a href="https://github.com/NadavLor/windbg-ext-mcp" target="_blank" rel="noreferrer"&gt;WinDbg EXT MCP&lt;/a&gt; to control a windbg instance that has the extension I wrote a long time ago, &lt;a href="https://gitlab.com/ntninja-dev/windows-exploit-development/wedp" target="_blank" rel="noreferrer"&gt;WEDP (Windows Exploit Development Plugin)&lt;/a&gt;, to improve the process of going from crash to POC.&lt;/p&gt;</description></item></channel></rss>