ida-pro-mcp and reverse-engineering-assistant

These are **competitors**: both provide MCP bridges for reverse engineering analysis, but they target different disassemblers (IDA Pro vs. Ghidra) and users must choose one based on their primary reverse engineering platform.

ida-pro-mcp
78
Verified
Maintenance 22/25
Adoption 10/25
Maturity 25/25
Community 21/25
Maintenance 20/25
Adoption 10/25
Maturity 16/25
Community 16/25
Stars: 6,275
Forks: 713
Downloads:
Commits (30d): 81
Language: Python
License: MIT
Stars: 629
Forks: 56
Downloads:
Commits (30d): 24
Language: Java
License: Apache-2.0
No risk flags
No Package No Dependents

About ida-pro-mcp

mrexodia/ida-pro-mcp

AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.

This tool helps reverse engineers analyze compiled software more efficiently by integrating advanced AI assistance directly into IDA Pro. It takes raw binary executables and, with the help of a language model, generates improved code comments, renamed variables, corrected data types, and descriptive function names. Malware analysts, security researchers, and software vulnerability explorers are the primary users.

reverse-engineering malware-analysis vulnerability-research binary-analysis software-auditing

About reverse-engineering-assistant

cyberkaida/reverse-engineering-assistant

MCP server for reverse engineering tasks in Ghidra 👩‍💻

This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.

reverse-engineering malware-analysis vulnerability-research firmware-analysis exploit-development

Scores updated daily from GitHub, PyPI, and npm data. How scores work