reverse-engineering-assistant
by cyberkaida·★ 731·Score 53
Ghidra MCP server for AI-powered reverse engineering with specialized tools for binary analysis.
Overview
ReVa is a sophisticated Ghidra extension that implements the Model Context Protocol to enable AI language models to interact with Ghidra's reverse engineering capabilities. It uses a tool-driven approach with specialized functions designed for effective LLM use in reverse engineering tasks. The server focuses on reducing context rot and hallucination by providing small, critical fragments with reinforcement links and additional context.
Try asking AI
After installing, here are 3 things you can ask your AI assistant:
When to choose this
Choose ReVa when you need AI assistance for reverse engineering tasks and already use or are willing to use Ghidra as your primary RE tool.
When NOT to choose this
Don't choose ReVa if you need support for other reverse engineering tools like IDA Pro or Binary Ninja, or if you prefer a GUI-based AI assistant over tool-driven approaches.
Tools this server exposes
12 tools extracted from the READMEexamine_programsExamine programs in the project and explain relationships
find_interesting_stringsFind interesting strings in the program
analyze_encryptionAnalyze program for encryption usage
generate_class_diagramGenerate a class diagram using plantuml syntax
analyze_mainStart from main and examine the program in detail
explain_segmentExplain the purpose of a program segment
analyze_functionAnalyze a function at a specific address
analyze_mmapAnalyze the mmap function behavior
create_ctf_scriptCreate a pwntools script for CTF problems
binary_triagePerform binary triage to identify key components
deep_analysisPerform deep analysis of the binary
cryptography_analysisAnalyze cryptographic implementations
Comparable tools
Installation
Installation
> NOTE: ReVa only supports Ghidra 12.0 and above!
- Download the release for your Ghidra version from the releases page and install using Ghidra's extension manager.
- Or build from source:
export GHIDRA_INSTALL_DIR=/path/to/ghidra
g radle install- Activate the plugin in two places:
- Project view → File → Configure → Configure all plugins → Check "ReVa Application Plugin" - Code Browser → File → Configure → Configure all plugins → Check "ReVa Plugin" → Save Tool
Claude Code Configuration
claude mcp add --scope user --transport http ReVa -- http://localhost:8080/mcp/messageVSCode Configuration
{
"mcp": {
"servers": {
"ReVa Assistant": {
"type": "http",
"url": "http://localhost:8080/mcp/message"
}
}
}
}Compare reverse-engineering-assistant with
Last updated · Auto-generated from public README + GitHub signals.