sjkim1127/Reversecore_MCP

A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.

46
/ 100
Emerging

This project helps cybersecurity analysts quickly understand unknown or malicious software. It takes in suspicious binary files (like `.exe`, `.dll`, or firmware images) and, guided by your natural language commands, automatically performs deep analysis to output disassembled code, extracted data, identified threats, and professional reports. Security researchers, malware analysts, and incident response teams use this to automate and accelerate reverse engineering tasks.

Use this if you need to rapidly analyze unknown executables, firmware, or potential malware and want to leverage AI to automate complex reverse engineering workflows.

Not ideal if you're primarily doing high-level source code analysis or if your organization's security policies prevent using third-party AI-driven analysis tools.

malware-analysis reverse-engineering threat-intelligence incident-response vulnerability-analysis
No Package No Dependents
Maintenance 10 / 25
Adoption 8 / 25
Maturity 13 / 25
Community 15 / 25

How are scores calculated?

Stars

49

Forks

8

Language

Python

License

MIT

Last pushed

Mar 05, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/sjkim1127/Reversecore_MCP"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.