ida-pro-mcp and reverse-engineering-assistant
These are **competitors**: both provide MCP bridges for reverse engineering analysis, but they target different disassemblers (IDA Pro vs. Ghidra) and users must choose one based on their primary reverse engineering platform.
About ida-pro-mcp
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
This tool helps reverse engineers analyze compiled software more efficiently by integrating advanced AI assistance directly into IDA Pro. It takes raw binary executables and, with the help of a language model, generates improved code comments, renamed variables, corrected data types, and descriptive function names. Malware analysts, security researchers, and software vulnerability explorers are the primary users.
About reverse-engineering-assistant
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work