reverse-engineering-assistant
Verified Safeby cyberkaida
Overview
Provides an MCP (Model Context Protocol) server to expose Ghidra's reverse engineering capabilities for AI models and automated binary analysis in a headless environment.
Installation
python -m reva_cliEnvironment Variables
- GHIDRA_INSTALL_DIR
Security Notes
The MCP server is a network service, which carries inherent risks. However, it provides API key authentication, which should be enabled for production use. No obvious 'eval' or hardcoded secrets were found in the provided source code. Tool operations are primarily interactions with Ghidra's robust APIs within a transaction management system.
Similar Servers
ida-pro-mcp
This project provides an MCP (Model Context Protocol) server that integrates with IDA Pro, enabling AI assistants to perform reverse engineering tasks like binary analysis, decompilation, memory manipulation, and debugging within the IDA Pro environment.
gemini-mcp-tool
A Model Context Protocol (MCP) server that enables AI assistants to interact with the Google Gemini CLI for comprehensive code and file analysis, structured edit suggestions, and creative brainstorming.
GhidrAssistMCP
This Ghidra extension provides an MCP server, enabling AI assistants and other tools to interact with Ghidra's reverse engineering capabilities through a standardized API, supporting program analysis, modification, and navigation.
jadx-mcp-server
Facilitates live, LLM-driven reverse engineering and vulnerability analysis of Android APKs by integrating JADX with the Model Context Protocol.