cyberkaida/reverse-engineering-assistant

MCP server for reverse engineering tasks in Ghidra 👩‍💻

62
/ 100
Established

This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.

629 stars. Actively maintained with 24 commits in the last 30 days.

Use this if you need an AI assistant to deeply understand and accelerate your reverse engineering tasks within Ghidra, especially for large and complex binaries or long-form analyses.

Not ideal if you are looking for a standalone reverse engineering tool that doesn't rely on Ghidra or if you prefer manual, step-by-step analysis without AI assistance.

reverse-engineering malware-analysis vulnerability-research firmware-analysis exploit-development
No Package No Dependents
Maintenance 20 / 25
Adoption 10 / 25
Maturity 16 / 25
Community 16 / 25

How are scores calculated?

Stars

629

Forks

56

Language

Java

License

Apache-2.0

Last pushed

Mar 09, 2026

Commits (30d)

24

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/cyberkaida/reverse-engineering-assistant"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.