Skip to main content

dnre-mcp 0.1.0 — .NET Reverse Engineering via MCP

Ryan Johnson
Author
Ryan Johnson
Windows Internals, Exploit Development, Red Teaming

I just released dnre-mcp 0.1.0, a standalone MCP server for .NET assembly reverse engineering and decompilation.

What It Does
#

dnre-mcp lets AI assistants load, inspect, and decompile .NET assemblies directly through the Model Context Protocol. It exposes 10 tools covering assembly loading, type and method discovery, namespace browsing, and full C# source decompilation. Under the hood it uses ICSharpCode.Decompiler, the same engine that powers ILSpy.

The idea came out of a workflow where I was using dnSpyEx with an MCP extension to reverse engineer .NET binaries. That worked, but it meant running a full GUI application just to give Claude access to the decompiler. dnre-mcp strips that down to a lightweight CLI tool that communicates over stdio — no GUI needed.

Getting Started
#

Pre-built binaries are available for Windows x64 and Linux x64 on the GitLab releases page, no .NET SDK required. If you prefer to build from source, you just need the .NET 10 SDK:

dotnet build src/DnreMcp/DnreMcp.csproj

Point your MCP client at the binary and you are good to go. Check the project page for full setup details.

What’s Next
#

This is an initial release so there is plenty of room to grow. Some things I want to add include resource analysis, cross-reference support, and better handling of generic types. If you try it out, I would love to hear how it goes.