reverse-engineering-assistant and Reversecore_MCP
These are complements—the first provides basic Ghidra integration for reverse engineering tasks, while the second extends the capability by orchestrating multiple specialized tools (Ghidra, Radare2, YARA) together with security-focused automation, allowing them to be used in tandem for more comprehensive analysis workflows.
About reverse-engineering-assistant
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.
About Reversecore_MCP
sjkim1127/Reversecore_MCP
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.
This project helps cybersecurity analysts quickly understand unknown or malicious software. It takes in suspicious binary files (like `.exe`, `.dll`, or firmware images) and, guided by your natural language commands, automatically performs deep analysis to output disassembled code, extracted data, identified threats, and professional reports. Security researchers, malware analysts, and incident response teams use this to automate and accelerate reverse engineering tasks.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work