sjkim1127/Reversecore_MCP
A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.
This project helps cybersecurity analysts quickly understand unknown or malicious software. It takes in suspicious binary files (like `.exe`, `.dll`, or firmware images) and, guided by your natural language commands, automatically performs deep analysis to output disassembled code, extracted data, identified threats, and professional reports. Security researchers, malware analysts, and incident response teams use this to automate and accelerate reverse engineering tasks.
Use this if you need to rapidly analyze unknown executables, firmware, or potential malware and want to leverage AI to automate complex reverse engineering workflows.
Not ideal if you're primarily doing high-level source code analysis or if your organization's security policies prevent using third-party AI-driven analysis tools.
Stars
49
Forks
8
Language
Python
License
MIT
Category
Last pushed
Mar 05, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/sjkim1127/Reversecore_MCP"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
mrexodia/ida-pro-mcp
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
cyberkaida/reverse-engineering-assistant
MCP server for reverse engineering tasks in Ghidra 👩💻
symgraph/GhidrAssistMCP
An MCP extension for Ghidra
soth-ai/mcp-reticle
Reticle intercepts, visualizes, and profiles JSON-RPC traffic between your LLM and MCP servers...
x42en/sysplant
Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP