reverse-engineering-assistant and BinAssistMCP
These are complementary tools that serve different reverse engineering platforms—one provides MCP integration for Ghidra while the other does so for Binary Ninja—allowing analysts to choose based on their preferred disassembler.
About reverse-engineering-assistant
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.
About BinAssistMCP
symgraph/BinAssistMCP
Binary Ninja plugin to provide MCP functionality.
This tool helps reverse engineers analyze binary files faster and more effectively by integrating directly with Binary Ninja and AI models like Claude. It allows you to feed raw binary files into the system and receive intelligent code analysis, vulnerability reports, and comprehensive documentation generated by AI. Malware analysts, vulnerability researchers, and security engineers benefit by automating complex analysis tasks and gaining deeper insights into software behavior.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work