MCP Catalogs
Homeida-pro-mcp screenshot

ida-pro-mcp

by mrexodia·8,558·Score 60

IDA Pro MCP server enabling AI-powered reverse engineering through MCP protocol integration.

securitydeveloper-toolsai-llm
1,026
Forks
43
Open issues
this month
Last commit
2d ago
Indexed

Overview

IDA Pro MCP is a sophisticated MCP server that bridges IDA Pro, the industry-standard binary analysis tool, with language models through the Model Context Protocol. It provides both GUI and headless modes, allowing AI assistants to interact with disassembled code, decompilation results, and binary analysis data. The server exposes numerous tools for decompilation, disassembly, cross-referencing, and metadata extraction, making it ideal for automated reverse engineering tasks and malware analysis workflows.

Try asking AI

After installing, here are 4 things you can ask your AI assistant:

you:Automated malware analysis with AI assistance
you:Binary vulnerability research and identification
you:Software reverse engineering and deobfuscation
you:What Python version is required?

When to choose this

Choose this server if you're performing reverse engineering tasks with IDA Pro and want to leverage AI assistance for code analysis and annotation.

When NOT to choose this

Avoid this if you don't have a licensed IDA Pro installation, need cross-platform support beyond what IDA offers, or require analysis capabilities for non-binary formats.

Tools this server exposes

12 tools extracted from the README
  • lookup_funcslookup_funcs(queries)

    Get function(s) by address or name (auto-detects, accepts list or comma-separated string).

  • int_convertint_convert(inputs)

    Convert numbers to different formats (decimal, hex, bytes, ASCII, binary).

  • list_funcslist_funcs(queries)

    List functions (paginated, filtered).

  • list_globalslist_globals(queries)

    List global variables (paginated, filtered).

  • importsimports(offset, count)

    List all imported symbols with module names (paginated).

  • decompiledecompile(addr)

    Decompile function at the given address.

  • disasmdisasm(addr)

    Disassemble function with full details (arguments, stack frame, etc).

  • xrefs_toxrefs_to(addrs)

    Get all cross-references to address(es).

  • xrefs_to_fieldxrefs_to_field(queries)

    Get cross-references to specific struct field(s).

  • calleescallees(addrs)

    Get functions called by function(s) at address(es).

  • get_bytesget_bytes(addrs)

    Read raw bytes at address(es).

  • get_stringget_string(addrs)

    Read null-terminated string(s).

Comparable tools

ghidra-mcpbinnaviradare2retdec

Installation

Installation (Claude Code)

claude plugin marketplace add mrexodia/claude-marketplace
claude plugin install ida-pro-mcp@mrexodia

To update to the latest version:

claude plugin update ida-pro-mcp@mrexodia

**Note**: This requires having idalib activated globally and [uv](https://astral.sh/uv) installed.

Installation (Manual)

pip install https://github.com/mrexodia/ida-pro-mcp/archive/refs/heads/main.zip
ida-pro-mcp --install

FAQ

What version of IDA Pro is required?
IDA Pro 8.3 or higher (9 recommended). IDA Free is not supported.
What Python version is required?
Python 3.11 or higher. Use idapyswitch to switch to the newest Python version.

On Hacker News

Recent discussion from the developer community.

Compare ida-pro-mcp with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.