cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
This tool helps reverse engineers analyze complex binaries and firmware images by integrating AI language models into Ghidra. You feed it a binary file or a project open in Ghidra, and it uses AI to provide insights, rename variables, identify algorithms, generate reports, and even create exploit scripts. It's designed for cybersecurity researchers, malware analysts, and vulnerability hunters who work with compiled code.
629 stars. Actively maintained with 24 commits in the last 30 days.
Use this if you need an AI assistant to deeply understand and accelerate your reverse engineering tasks within Ghidra, especially for large and complex binaries or long-form analyses.
Not ideal if you are looking for a standalone reverse engineering tool that doesn't rely on Ghidra or if you prefer manual, step-by-step analysis without AI assistance.
Stars
629
Forks
56
Language
Java
License
Apache-2.0
Category
Last pushed
Mar 09, 2026
Commits (30d)
24
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/cyberkaida/reverse-engineering-assistant"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Compare
Related servers
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
symgraph/GhidrAssistMCP
An MCP extension for Ghidra
soth-ai/mcp-reticle
Reticle intercepts, visualizes, and profiles JSON-RPC traffic between your LLM and MCP servers...
x42en/sysplant
Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP
sjkim1127/Reversecore_MCP
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for...