reverse-engineering-assistant and BinAssistMCP

These are complementary tools that serve different reverse engineering platforms—one provides MCP integration for Ghidra while the other does so for Binary Ninja—allowing analysts to choose based on their preferred disassembler.

BinAssistMCP
46
Emerging
Maintenance 20/25
Adoption 10/25
Maturity 16/25
Community 16/25
Maintenance 10/25
Adoption 6/25
Maturity 15/25
Community 15/25
Stars: 629
Forks: 56
Downloads:
Commits (30d): 24
Language: Java
License: Apache-2.0
Stars: 20
Forks: 4
Downloads:
Commits (30d): 0
Language: Python
License: MIT
No Package No Dependents
No Package No Dependents

About reverse-engineering-assistant

cyberkaida/reverse-engineering-assistant

MCP server for reverse engineering tasks in Ghidra 👩‍💻

This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.

reverse-engineering malware-analysis vulnerability-research firmware-analysis exploit-development

About BinAssistMCP

symgraph/BinAssistMCP

Binary Ninja plugin to provide MCP functionality.

This tool helps reverse engineers analyze binary files faster and more effectively by integrating directly with Binary Ninja and AI models like Claude. It allows you to feed raw binary files into the system and receive intelligent code analysis, vulnerability reports, and comprehensive documentation generated by AI. Malware analysts, vulnerability researchers, and security engineers benefit by automating complex analysis tasks and gaining deeper insights into software behavior.

reverse-engineering vulnerability-research malware-analysis binary-analysis protocol-analysis

Scores updated daily from GitHub, PyPI, and npm data. How scores work