MCP Catalogs
Home

ILSpy-Mcp

by bivex·33·Score 44

A .NET assembly decompiler and analysis tool that exposes ILSpy's capabilities through the MCP protocol for AI assistants.

developer-toolsai-llmother
6
Forks
0
Open issues
2 mo ago
Last commit
2d ago
Indexed

Overview

ILSpy MCP Server is a specialized tool that enables AI assistants to decompile and analyze .NET assemblies through natural language commands. It integrates ILSpy, a popular .NET decompiler, to provide powerful reverse-engineering capabilities directly in AI environments like Claude Code and Cursor. The server offers a comprehensive set of tools for assembly analysis, including type decompilation, method extraction, type hierarchy analysis, and member search. The implementation follows a clean architecture with clear separation of concerns, providing read-only operations with proper security measures including assembly path validation and timeout controls. It's actively maintained with recent commits and offers detailed configuration options through environment variables.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Reverse-engineer .NET assemblies to understand their structure and functionality
you:Analyze third-party libraries to understand their APIs and implementation details
you:Debug .NET applications by examining the actual code rather than just debugging symbols
you:What .NET versions does this support?
you:Can I decompile obfuscated assemblies?

When to choose this

Choose ILSpy-MCP when you need to reverse engineer .NET assemblies through AI assistants without leaving your development environment.

When NOT to choose this

Don't choose this if you need to analyze non-.NET code or require write access to assemblies, as this server is read-only and limited to the .NET ecosystem.

Tools this server exposes

8 tools extracted from the README
  • decompile_type

    Decompile and analyze a .NET type from a DLL

  • decompile_method

    Decompile and analyze a specific method

  • list_assembly_types

    List all types in an assembly

  • analyze_assembly

    Get architectural overview of an assembly

  • get_type_members

    Get complete API surface of a type

  • find_type_hierarchy

    Find inheritance relationships

  • search_members_by_name

    Search for members by name

  • find_extension_methods

    Find extension methods for a type

Comparable tools

dnspy-mcpdotpeek-mcpilspy

Installation

Installation

Prerequisites

  • .NET 9.0 SDK or higher
  • MCP-compatible client (Claude Code, Cursor, Claude Desktop, etc.)

Install the tool

dotnet tool install -g ILSpyMcp.Server

Update to latest version

dotnet tool update -g ILSpyMcp.Server

Configure for Claude Desktop

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "ilspy-mcp": {
      "command": "ilspy-mcp",
      "args": []
    }
  }
}

FAQ

What .NET versions does this support?
The server supports decompiling assemblies from various .NET versions, including .NET Framework and .NET Core/.NET 5+.
Can I decompile obfuscated assemblies?
ILSpy can handle partially obfuscated code, but heavily obfuscated assemblies may not decompile properly. Results depend on the obfuscation technique used.

Compare ILSpy-Mcp with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.