MCP Catalogs
Home

reverse-engineering-assistant

by cyberkaida·731·Score 53

Ghidra MCP server for AI-powered reverse engineering with specialized tools for binary analysis.

developer-toolssecurityai-llm
63
Forks
19
Open issues
this month
Last commit
2d ago
Indexed

Overview

ReVa is a sophisticated Ghidra extension that implements the Model Context Protocol to enable AI language models to interact with Ghidra's reverse engineering capabilities. It uses a tool-driven approach with specialized functions designed for effective LLM use in reverse engineering tasks. The server focuses on reducing context rot and hallucination by providing small, critical fragments with reinforcement links and additional context.

Try asking AI

After installing, here are 3 things you can ask your AI assistant:

you:Automating binary analysis tasks in security research
you:Assisted reverse engineering in malware analysis
you:Generating reports on algorithms and encryption in software

When to choose this

Choose ReVa when you need AI assistance for reverse engineering tasks and already use or are willing to use Ghidra as your primary RE tool.

When NOT to choose this

Don't choose ReVa if you need support for other reverse engineering tools like IDA Pro or Binary Ninja, or if you prefer a GUI-based AI assistant over tool-driven approaches.

Tools this server exposes

12 tools extracted from the README
  • examine_programs

    Examine programs in the project and explain relationships

  • find_interesting_strings

    Find interesting strings in the program

  • analyze_encryption

    Analyze program for encryption usage

  • generate_class_diagram

    Generate a class diagram using plantuml syntax

  • analyze_main

    Start from main and examine the program in detail

  • explain_segment

    Explain the purpose of a program segment

  • analyze_function

    Analyze a function at a specific address

  • analyze_mmap

    Analyze the mmap function behavior

  • create_ctf_script

    Create a pwntools script for CTF problems

  • binary_triage

    Perform binary triage to identify key components

  • deep_analysis

    Perform deep analysis of the binary

  • cryptography_analysis

    Analyze cryptographic implementations

Comparable tools

ghidra-mcpida-pro-ai-assistantbinaryninja-mcpretdec-analyzer

Installation

Installation

> NOTE: ReVa only supports Ghidra 12.0 and above!

  1. Download the release for your Ghidra version from the releases page and install using Ghidra's extension manager.
  1. Or build from source:
export GHIDRA_INSTALL_DIR=/path/to/ghidra
g radle install
  1. Activate the plugin in two places:

- Project view → File → Configure → Configure all plugins → Check "ReVa Application Plugin" - Code Browser → File → Configure → Configure all plugins → Check "ReVa Plugin" → Save Tool

Claude Code Configuration

claude mcp add --scope user --transport http ReVa -- http://localhost:8080/mcp/message

VSCode Configuration

{
  "mcp": {
    "servers": {
      "ReVa Assistant": {
        "type": "http",
        "url": "http://localhost:8080/mcp/message"
      }
    }
  }
}

Compare reverse-engineering-assistant with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.