reverse-engineering-assistant and MCP-Ghidra5

These are competitors offering overlapping Ghidra-based reverse engineering capabilities, with the first being a mature, community-backed solution while the second appears to be a proprietary alternative with claimed AI-enhancement features.

MCP-Ghidra5
39
Emerging
Maintenance 20/25
Adoption 10/25
Maturity 16/25
Community 16/25
Maintenance 6/25
Adoption 4/25
Maturity 15/25
Community 14/25
Stars: 629
Forks: 56
Downloads:
Commits (30d): 24
Language: Java
License: Apache-2.0
Stars: 7
Forks: 3
Downloads:
Commits (30d): 0
Language: Python
License:
No Package No Dependents
No Package No Dependents

About reverse-engineering-assistant

cyberkaida/reverse-engineering-assistant

MCP server for reverse engineering tasks in Ghidra 👩‍💻

This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.

reverse-engineering malware-analysis vulnerability-research firmware-analysis exploit-development

About MCP-Ghidra5

TheStingR/MCP-Ghidra5

🎯 Advanced GPT-5 Powered Ghidra Reverse Engineering MCP Server | 7 AI-Enhanced Analysis Tools | Professional Binary Analysis | TechSquad Inc. Proprietary Software

Scores updated daily from GitHub, PyPI, and npm data. How scores work