ida-pro-mcp and Reversecore_MCP
These are complementary tools that serve different reverse engineering workflows: IDA Pro integration excels at interactive disassembly and detailed analysis, while the Ghidra/Radare2/YARA orchestration stack provides multi-tool automation and security-focused pattern matching that can be combined for comprehensive analysis pipelines.
About ida-pro-mcp
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
This tool helps reverse engineers analyze compiled software more efficiently by integrating advanced AI assistance directly into IDA Pro. It takes raw binary executables and, with the help of a language model, generates improved code comments, renamed variables, corrected data types, and descriptive function names. Malware analysts, security researchers, and software vulnerability explorers are the primary users.
About Reversecore_MCP
sjkim1127/Reversecore_MCP
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.
This project helps cybersecurity analysts quickly understand unknown or malicious software. It takes in suspicious binary files (like `.exe`, `.dll`, or firmware images) and, guided by your natural language commands, automatically performs deep analysis to output disassembled code, extracted data, identified threats, and professional reports. Security researchers, malware analysts, and incident response teams use this to automate and accelerate reverse engineering tasks.
Related comparisons
Scores updated daily from GitHub, PyPI, and npm data. How scores work