reverse-engineering-assistant and GhidrAssistMCP

These are competitors offering overlapping MCP server functionality for Ghidra—both provide AI-assisted reverse engineering capabilities through the same integration point, so users would typically choose one based on feature set and implementation quality rather than use them together.

GhidrAssistMCP
57
Established
Maintenance 20/25
Adoption 10/25
Maturity 16/25
Community 16/25
Maintenance 17/25
Adoption 10/25
Maturity 15/25
Community 15/25
Stars: 629
Forks: 56
Downloads:
Commits (30d): 24
Language: Java
License: Apache-2.0
Stars: 518
Forks: 38
Downloads:
Commits (30d): 8
Language: Java
License: MIT
No Package No Dependents
No Package No Dependents

About reverse-engineering-assistant

cyberkaida/reverse-engineering-assistant

MCP server for reverse engineering tasks in Ghidra 👩‍💻

This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.

reverse-engineering malware-analysis vulnerability-research firmware-analysis exploit-development

About GhidrAssistMCP

symgraph/GhidrAssistMCP

An MCP extension for Ghidra

This is a Ghidra extension for reverse engineers who want to automate or enhance their analysis with AI tools. It turns Ghidra into a server that accepts requests from AI assistants or other automated scripts. You feed it a binary file in Ghidra, and an AI client can then query Ghidra's analysis capabilities to get program information, function details, strings, or even create data structures.

reverse-engineering malware-analysis binary-analysis exploit-development vulnerability-research

Scores updated daily from GitHub, PyPI, and npm data. How scores work